Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
h40thEqmz6.exe

Overview

General Information

Sample name:h40thEqmz6.exe
renamed because original name is a hash value
Original sample name:c344f9de1aa1bf284d8281aff7b216ca85b2dde7fc05e1d13b5abcef37d4ca0d.exe
Analysis ID:1584666
MD5:e3ae2dc9b8b0582a266871b52e85c36f
SHA1:f783d1d0354bf3ad1dc4e506e4df3250a89ee765
SHA256:c344f9de1aa1bf284d8281aff7b216ca85b2dde7fc05e1d13b5abcef37d4ca0d
Tags:exeuser-zhuzhu0009
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell launch regsvr32
System process connects to network (likely due to code injection or exploit)
.NET source code contains potential unpacker
AI detected suspicious sample
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Loading BitLocker PowerShell Module
Sets debug register (to hijack the execution of another thread)
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Suspicious powershell command line found
Uses Register-ScheduledTask to add task schedules
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Network Connection Initiated By Regsvr32.EXE
Sigma detected: Potential Regsvr32 Commandline Flag Anomaly
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • h40thEqmz6.exe (PID: 6604 cmdline: "C:\Users\user\Desktop\h40thEqmz6.exe" MD5: E3AE2DC9B8B0582A266871B52E85C36F)
    • h40thEqmz6.tmp (PID: 5960 cmdline: "C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp" /SL5="$1041E,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" MD5: 8FDC58C7D4C59472615682D6DEA9D190)
      • h40thEqmz6.exe (PID: 6980 cmdline: "C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT MD5: E3AE2DC9B8B0582A266871B52E85C36F)
        • h40thEqmz6.tmp (PID: 2672 cmdline: "C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp" /SL5="$2042C,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT MD5: 8FDC58C7D4C59472615682D6DEA9D190)
          • regsvr32.exe (PID: 3680 cmdline: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
            • regsvr32.exe (PID: 7160 cmdline: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
              • powershell.exe (PID: 6024 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
                • conhost.exe (PID: 348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 2000 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
                • conhost.exe (PID: 5036 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • regsvr32.exe (PID: 6520 cmdline: "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Coat.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • regsvr32.exe (PID: 1268 cmdline: C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3245140417.00000000025C0000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
  • 0xa708:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
  • 0xa756:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
  • 0xa7a4:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xe188:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x116be:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000006.00000002.3244688637.0000000000A3B000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x2cec8:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x303fe:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
SourceRuleDescriptionAuthorStrings
6.2.regsvr32.exe.25c0000.1.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
  • 0x8908:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
  • 0x8956:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
  • 0x89a4:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
6.2.regsvr32.exe.26e130d.2.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xb07b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
6.2.regsvr32.exe.26e130d.2.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
  • 0x8908:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
  • 0x8956:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
  • 0x89a4:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
6.2.regsvr32.exe.25c0000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDeviceDetects executables attemping to enumerate video devices using WMIditekSHen
  • 0xa708:$d1: {860BB310-5D01-11d0-BD3B-00A0C911CE86}
  • 0xa756:$d2: {62BE5D10-60EB-11d0-BD3B-00A0C911CE86}
  • 0xa7a4:$d3: {55272A00-42CB-11CE-8135-00AA004BB851}
6.2.regsvr32.exe.a5b04d.0.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0xb07b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
Click to see the 5 entries

System Summary

barindex
Source: Process startedAuthor: elhoim, Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 7160, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", ProcessId: 6024, ProcessName: powershell.exe
Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DestinationIp: 38.49.56.2, DestinationIsIpv6: false, DestinationPort: 56005, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 7160, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49730
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll, CommandLine: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp" /SL5="$2042C,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp, ParentProcessId: 2672, ParentProcessName: h40thEqmz6.tmp, ProcessCommandLine: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll, ProcessId: 3680, ProcessName: regsvr32.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 7160, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", ProcessId: 6024, ProcessName: powershell.exe

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 7160, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }", ProcessId: 6024, ProcessName: powershell.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Roaming\Setup_Coat.dll (copy)ReversingLabs: Detection: 69%
Source: C:\Users\user\AppData\Roaming\is-CBKGS.tmpReversingLabs: Detection: 69%
Source: h40thEqmz6.exeVirustotal: Detection: 63%Perma Link
Source: h40thEqmz6.exeReversingLabs: Detection: 55%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 85.0% probability
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93100B0 TlsGetValue,BCryptGenRandom,SystemFunction036,TlsGetValue,TlsGetValue,TlsSetValue,HeapFree,HeapFree,TlsSetValue,HeapFree,HeapFree,TlsSetValue,HeapFree,HeapFree,TlsSetValue,6_2_00007FF8A93100B0
Source: h40thEqmz6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\File Manager_is1Jump to behavior
Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push r136_2_00007FF8A9355404

Networking

barindex
Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 38.49.56.2 56003Jump to behavior
Source: global trafficTCP traffic: 38.49.56.2 ports 0,56005,5,6,56003,56004
Source: global trafficTCP traffic: 192.168.2.5:49730 -> 38.49.56.2:56005
Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: unknownTCP traffic detected without corresponding DNS query: 38.49.56.2
Source: powershell.exe, 00000007.00000002.2096777613.000001D2BE6CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000007.00000002.2065758420.000001D2AE888000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: powershell.exe, 00000007.00000002.2065758420.000001D2AE661000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: powershell.exe, 00000007.00000002.2065758420.000001D2AE888000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: h40thEqmz6.exe, 00000000.00000003.1996919927.00000000023D0000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.exe, 00000000.00000003.1997111463.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.tmp, 00000001.00000000.1997652661.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-UGL1J.tmp.4.dr, h40thEqmz6.tmp.0.dr, h40thEqmz6.tmp.2.drString found in binary or memory: http://www.innosetup.com/
Source: powershell.exe, 00000009.00000002.2226315650.000002C4244A0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
Source: h40thEqmz6.exe, 00000000.00000003.1996919927.00000000023D0000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.exe, 00000000.00000003.1997111463.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.tmp, 00000001.00000000.1997652661.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-UGL1J.tmp.4.dr, h40thEqmz6.tmp.0.dr, h40thEqmz6.tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
Source: powershell.exe, 00000007.00000002.2065758420.000001D2AE661000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BC41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
Source: powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: h40thEqmz6.tmp, 00000004.00000003.2007225545.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmp, is-CBKGS.tmp.4.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support/rust/deps
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000007.00000002.2096777613.000001D2BE6CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, Keylogger.cs.Net Code: KeyboardLayout

System Summary

barindex
Source: 6.2.regsvr32.exe.25c0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 6.2.regsvr32.exe.26e130d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 6.2.regsvr32.exe.26e130d.2.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 6.2.regsvr32.exe.a5b04d.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 6.2.regsvr32.exe.a5b04d.0.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 00000006.00000002.3245140417.00000000025C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables attemping to enumerate video devices using WMI Author: ditekSHen
Source: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: 00000006.00000002.3244688637.0000000000A3B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9305D24 memset,HeapCreate,HeapAlloc,GetLastError,memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,DeleteFileW,HeapFree,GetLastError,HeapFree,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,6_2_00007FF8A9305D24
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931D410 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,6_2_00007FF8A931D410
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9306288 memset,HeapCreate,HeapAlloc,GetLastError,memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,6_2_00007FF8A9306288
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9347C006_2_00007FF8A9347C00
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9301E806_2_00007FF8A9301E80
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9305D246_2_00007FF8A9305D24
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9305DE86_2_00007FF8A9305DE8
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93100B06_2_00007FF8A93100B0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93402306_2_00007FF8A9340230
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9363A706_2_00007FF8A9363A70
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9345A206_2_00007FF8A9345A20
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A933CAC06_2_00007FF8A933CAC0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9312AA06_2_00007FF8A9312AA0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93469106_2_00007FF8A9346910
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A930D9C06_2_00007FF8A930D9C0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93279B06_2_00007FF8A93279B0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9322C406_2_00007FF8A9322C40
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BC496_2_00007FF8A932BC49
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931DC006_2_00007FF8A931DC00
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9321CA06_2_00007FF8A9321CA0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BCAF6_2_00007FF8A932BCAF
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BB5F6_2_00007FF8A932BB5F
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9311B726_2_00007FF8A9311B72
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9313B006_2_00007FF8A9313B00
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BB066_2_00007FF8A932BB06
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931AB306_2_00007FF8A931AB30
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BE346_2_00007FF8A932BE34
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A930CEE06_2_00007FF8A930CEE0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9346EE96_2_00007FF8A9346EE9
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9309EF06_2_00007FF8A9309EF0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BEB06_2_00007FF8A932BEB0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9345EB06_2_00007FF8A9345EB0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9320D406_2_00007FF8A9320D40
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A934ED506_2_00007FF8A934ED50
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9305D446_2_00007FF8A9305D44
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9317DB06_2_00007FF8A9317DB0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931E0506_2_00007FF8A931E050
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931C0C06_2_00007FF8A931C0C0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93350A06_2_00007FF8A93350A0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A935E0A06_2_00007FF8A935E0A0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932BF3E6_2_00007FF8A932BF3E
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931BF506_2_00007FF8A931BF50
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9362F606_2_00007FF8A9362F60
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931AFA06_2_00007FF8A931AFA0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9363FA06_2_00007FF8A9363FA0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932C24B6_2_00007FF8A932C24B
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932C2626_2_00007FF8A932C262
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A933B2706_2_00007FF8A933B270
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932B2006_2_00007FF8A932B200
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93522C06_2_00007FF8A93522C0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93062886_2_00007FF8A9306288
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932C29F6_2_00007FF8A932C29F
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A936E2B06_2_00007FF8A936E2B0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A930C1D06_2_00007FF8A930C1D0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93321906_2_00007FF8A9332190
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A934F4606_2_00007FF8A934F460
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93624C06_2_00007FF8A93624C0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93503706_2_00007FF8A9350370
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93213306_2_00007FF8A9321330
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93383D06_2_00007FF8A93383D0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93503906_2_00007FF8A9350390
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A933A6506_2_00007FF8A933A650
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932B6706_2_00007FF8A932B670
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93476D06_2_00007FF8A93476D0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93356A06_2_00007FF8A93356A0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93525606_2_00007FF8A9352560
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93405806_2_00007FF8A9340580
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93458706_2_00007FF8A9345870
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A932B8976_2_00007FF8A932B897
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93238A06_2_00007FF8A93238A0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93047036_2_00007FF8A9304703
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A930474F6_2_00007FF8A930474F
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93047906_2_00007FF8A9304790
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A93237F06_2_00007FF8A93237F0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A934B7B06_2_00007FF8A934B7B0
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026EF7F86_2_026EF7F8
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026EF41C6_2_026EF41C
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026F06DC6_2_026F06DC
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026EE5406_2_026EE540
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026F2ED46_2_026F2ED4
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026EFC286_2_026EFC28
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C500B7_2_00007FF8489C500B
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF8489B4DFB9_2_00007FF8489B4DFB
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8A9353C4C appears 94 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8A930A6D0 appears 32 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8A930BB00 appears 48 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8A930A3D0 appears 73 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8A931CDC0 appears 54 times
Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FF8A9334A90 appears 46 times
Source: h40thEqmz6.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: h40thEqmz6.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: h40thEqmz6.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: h40thEqmz6.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: h40thEqmz6.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-UGL1J.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: is-UGL1J.tmp.4.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: is-CBKGS.tmp.4.drStatic PE information: Number of sections : 11 > 10
Source: h40thEqmz6.exe, 00000000.00000003.1996919927.00000000024E2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs h40thEqmz6.exe
Source: h40thEqmz6.exe, 00000000.00000003.1997111463.000000007FE3E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs h40thEqmz6.exe
Source: h40thEqmz6.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: 6.2.regsvr32.exe.25c0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 6.2.regsvr32.exe.26e130d.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 6.2.regsvr32.exe.26e130d.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 6.2.regsvr32.exe.a5b04d.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 6.2.regsvr32.exe.a5b04d.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 00000006.00000002.3245140417.00000000025C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice author = ditekSHen, description = Detects executables attemping to enumerate video devices using WMI
Source: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 00000006.00000002.3244688637.0000000000A3B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, Settings.csBase64 encoded string: 'kSygpm1E7aAOujMHZ0/StPnSJY2viqeRt7smgjVcOMMDqeZzp2AKn8DeMAcvka9ckV95lR8j1CORbO0z3bhXYw==', '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', '+p2ln4TCAOeoVRgUtLxpNOZHRMT7dEptCbKqBfr8pu37fvYTtGiolfWxR2yrvbC5Z43rEJYdUSdLTwI5RxiN0l8UcgQfnILuBANozHKyIyM8KG054vTgbecz0mXr9z/saWmDhCrLCUEOi2gdPMDBD61ygzdbf5fTth8gf5CIz8hDkdV0bKZ6uAd9BM36X3U84Vl0qvPTqxrUWmCo6Kbz4p7hdh3x9O9Wut/Z0IqqyyTI8S6nHPERICPnaDh9/G3eJPt7CHR6s4TRjpF6NC1c3zHXI2ox8hGQFHEUVypmDnE=', 'lbdfC6M5sK6u7I1H+pAznYpPn5TBL+YVD4PhIdFhqoXJm+PYdBchGO9f8Y4Z3fNlwPKcVjmKKENv8wqxAxSdXw==', 'kUfn6rNnkLhLikJqrap5wjPca36G7JdE2ST3bMdB+6knlQ6aun7SOTdJF7sQZ6iV3U1nOK9fBOuEyTctxOB0Cg==', 'IXlMvvGfqHyO9T8m7SsHvSIkdCG72uFdmeEves5wHNILzJQzxzKS5rYprb86UmzFYGhrXLjSnlW1raFi1QvxrQ==', 'xANp/mrNjcC4VQCwEp9ljBc3a94p1HV++kbIGKZSZafWTXZIVxoWceXI+cIB6NK5lUw8MUrhIN5Ez0rdXL152A==', 'n9sSQ7otlJZ1DqSKeoA7qAS8ao9Eg6xMQPDIoWhNDKXSvxf1inB0zcE46EuDMtWgW2KJSibL8OWOXadfXhYOfg=='
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, Settings.csBase64 encoded string: 'kSygpm1E7aAOujMHZ0/StPnSJY2viqeRt7smgjVcOMMDqeZzp2AKn8DeMAcvka9ckV95lR8j1CORbO0z3bhXYw==', 'nxA3lKPGVFipfZp/DDfki009vc7627jtoOjJ2bbJkzVnr0U8PK7Hyyuw2BOd8e7ZiJ3kN7XAw9OUr1HpRwVqNO90PN9045eIHPI6LpuF7U1yf0kHXzguoAfTQl4uMqKViwWmB8DVg6SEGXVhH9lyAfkMBPM/577MQMbdfdmW8zCLJuRu0aLYPU+0XFwXmZpTS2DKoruI+pnix8Smc0zQT8puhBzouEQKY98gqIdP+SP+RGe807Jf/cvWVyElsICCWpCGkZnjOr6KrrqDxRRbfmFiuXwGAbhBUq5gbsyssWiCsMXsB8QrN5YaWhTCD+CxT6iDMb1iuiM2i264hXyn3J++GxUWEZsc5aQq+r8q25mhxrtiOPR93YsHpYRk0gGshGjV6L1cuh2JVXv2Ph+4TfNS5I++qm9IKPLLxZExOovXgiNl1JNy4eMQOhRRQKC8CbHXuMOZYsohFlqqAXnFdNSOxcPfDqbM2mpThsIQTFRZIRhdvfCG89Y4GvuJykaQrwcWbIFU9M/rYSIU58rxhjbIn0iajwLuaTgs738tL494ON7u/KZbhRBl9Yt+y4ssCF6f66KQGD1MFGNRcAAfhD859DdLC6HhYpHM0XGdWq+cZFWSxqO7vyaVkHmQuqofyxt6Kqctqkrh3Kcs4O5uOhXEawA0/NR/4EDHpT3IKoy5DQBeLH+U/9UmgGcXygZVOPP085dDDrq+mDg9sO1aNLBkoIM+Teub8vr5K266igcyO8x3KnNZvFZgBgkqIBy7O/UGTC0lABqCoaypJVpn8cXag852RuOQpjYv6W1QoVDyIcbK2ni6rU7T030ba/Kzm0Sc3ScgmTRKZj64U2CXrB0q4D/PJyc/HfRJN0sP63w7vExVFbPK1QAn8/1FBGNfWQyYP9OeXTpXdUkuQwF7SArA98tzsk7JpQtmGJ0pK+JQP+p+lST0zF5Z8ZNCNwzZ3PfhQ1xc6eb0nmb0QaJvFwDjP1+KAScnelmMCt6xjmv/L9zKQdQhKeXk8mvLFA+gpyKz8S3LAFQr99ab81gKKbLY8U8lERl4PFwJAawp9Fk=', '+p2ln4TCAOeoVRgUtLxpNOZHRMT7dEptCbKqBfr8pu37fvYTtGiolfWxR2yrvbC5Z43rEJYdUSdLTwI5RxiN0l8UcgQfnILuBANozHKyIyM8KG054vTgbecz0mXr9z/saWmDhCrLCUEOi2gdPMDBD61ygzdbf5fTth8gf5CIz8hDkdV0bKZ6uAd9BM36X3U84Vl0qvPTqxrUWmCo6Kbz4p7hdh3x9O9Wut/Z0IqqyyTI8S6nHPERICPnaDh9/G3eJPt7CHR6s4TRjpF6NC1c3zHXI2ox8hGQFHEUVypmDnE=', 'lbdfC6M5sK6u7I1H+pAznYpPn5TBL+YVD4PhIdFhqoXJm+PYdBchGO9f8Y4Z3fNlwPKcVjmKKENv8wqxAxSdXw==', 'kUfn6rNnkLhLikJqrap5wjPca36G7JdE2ST3bMdB+6knlQ6aun7SOTdJF7sQZ6iV3U1nOK9fBOuEyTctxOB0Cg==', 'IXlMvvGfqHyO9T8m7SsHvSIkdCG72uFdmeEves5wHNILzJQzxzKS5rYprb86UmzFYGhrXLjSnlW1raFi1QvxrQ==', 'xANp/mrNjcC4VQCwEp9ljBc3a94p1HV++kbIGKZSZafWTXZIVxoWceXI+cIB6NK5lUw8MUrhIN5Ez0rdXL152A==', 'n9sSQ7otlJZ1DqSKeoA7qAS8ao9Eg6xMQPDIoWhNDKXSvxf1inB0zcE46EuDMtWgW2KJSibL8OWOXadfXhYOfg=='
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, Settings.csBase64 encoded string: 'kSygpm1E7aAOujMHZ0/StPnSJY2viqeRt7smgjVcOMMDqeZzp2AKn8DeMAcvka9ckV95lR8j1CORbO0z3bhXYw==', 'nxA3lKPGVFipfZp/DDfki009vc7627jtoOjJ2bbJkzVnr0U8PK7Hyyuw2BOd8e7ZiJ3kN7XAw9OUr1HpRwVqNO90PN9045eIHPI6LpuF7U1yf0kHXzguoAfTQl4uMqKViwWmB8DVg6SEGXVhH9lyAfkMBPM/577MQMbdfdmW8zCLJuRu0aLYPU+0XFwXmZpTS2DKoruI+pnix8Smc0zQT8puhBzouEQKY98gqIdP+SP+RGe807Jf/cvWVyElsICCWpCGkZnjOr6KrrqDxRRbfmFiuXwGAbhBUq5gbsyssWiCsMXsB8QrN5YaWhTCD+CxT6iDMb1iuiM2i264hXyn3J++GxUWEZsc5aQq+r8q25mhxrtiOPR93YsHpYRk0gGshGjV6L1cuh2JVXv2Ph+4TfNS5I++qm9IKPLLxZExOovXgiNl1JNy4eMQOhRRQKC8CbHXuMOZYsohFlqqAXnFdNSOxcPfDqbM2mpThsIQTFRZIRhdvfCG89Y4GvuJykaQrwcWbIFU9M/rYSIU58rxhjbIn0iajwLuaTgs738tL494ON7u/KZbhRBl9Yt+y4ssCF6f66KQGD1MFGNRcAAfhD859DdLC6HhYpHM0XGdWq+cZFWSxqO7vyaVkHmQuqofyxt6Kqctqkrh3Kcs4O5uOhXEawA0/NR/4EDHpT3IKoy5DQBeLH+U/9UmgGcXygZVOPP085dDDrq+mDg9sO1aNLBkoIM+Teub8vr5K266igcyO8x3KnNZvFZgBgkqIBy7O/UGTC0lABqCoaypJVpn8cXag852RuOQpjYv6W1QoVDyIcbK2ni6rU7T030ba/Kzm0Sc3ScgmTRKZj64U2CXrB0q4D/PJyc/HfRJN0sP63w7vExVFbPK1QAn8/1FBGNfWQyYP9OeXTpXdUkuQwF7SArA98tzsk7JpQtmGJ0pK+JQP+p+lST0zF5Z8ZNCNwzZ3PfhQ1xc6eb0nmb0QaJvFwDjP1+KAScnelmMCt6xjmv/L9zKQdQhKeXk8mvLFA+gpyKz8S3LAFQr99ab81gKKbLY8U8lERl4PFwJAawp9Fk=', '+p2ln4TCAOeoVRgUtLxpNOZHRMT7dEptCbKqBfr8pu37fvYTtGiolfWxR2yrvbC5Z43rEJYdUSdLTwI5RxiN0l8UcgQfnILuBANozHKyIyM8KG054vTgbecz0mXr9z/saWmDhCrLCUEOi2gdPMDBD61ygzdbf5fTth8gf5CIz8hDkdV0bKZ6uAd9BM36X3U84Vl0qvPTqxrUWmCo6Kbz4p7hdh3x9O9Wut/Z0IqqyyTI8S6nHPERICPnaDh9/G3eJPt7CHR6s4TRjpF6NC1c3zHXI2ox8hGQFHEUVypmDnE=', 'lbdfC6M5sK6u7I1H+pAznYpPn5TBL+YVD4PhIdFhqoXJm+PYdBchGO9f8Y4Z3fNlwPKcVjmKKENv8wqxAxSdXw==', 'kUfn6rNnkLhLikJqrap5wjPca36G7JdE2ST3bMdB+6knlQ6aun7SOTdJF7sQZ6iV3U1nOK9fBOuEyTctxOB0Cg==', 'IXlMvvGfqHyO9T8m7SsHvSIkdCG72uFdmeEves5wHNILzJQzxzKS5rYprb86UmzFYGhrXLjSnlW1raFi1QvxrQ==', 'xANp/mrNjcC4VQCwEp9ljBc3a94p1HV++kbIGKZSZafWTXZIVxoWceXI+cIB6NK5lUw8MUrhIN5Ez0rdXL152A==', 'n9sSQ7otlJZ1DqSKeoA7qAS8ao9Eg6xMQPDIoWhNDKXSvxf1inB0zcE46EuDMtWgW2KJSibL8OWOXadfXhYOfg=='
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/22@0/1
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A931FC70 memset,FormatMessageW,GetLastError,HeapFree,HeapFree,6_2_00007FF8A931FC70
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A934B7B0 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,CreateToolhelp32Snapshot,memset,Module32FirstW,Module32NextW,UnmapViewOfFile,CloseHandle,HeapFree,UnmapViewOfFile,CloseHandle,CloseHandle,HeapFree,HeapFree,HeapFree,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,UnmapViewOfFile,CloseHandle,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,HeapFree,HeapFree,GetLastError,HeapFree,6_2_00007FF8A934B7B0
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\unins000.datJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5036:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:348:120:WilError_03
Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\0no3m
Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\gkggeeqkwjd
Source: C:\Users\user\Desktop\h40thEqmz6.exeFile created: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmpJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: h40thEqmz6.exeVirustotal: Detection: 63%
Source: h40thEqmz6.exeReversingLabs: Detection: 55%
Source: C:\Users\user\Desktop\h40thEqmz6.exeFile read: C:\Users\user\Desktop\h40thEqmz6.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\h40thEqmz6.exe "C:\Users\user\Desktop\h40thEqmz6.exe"
Source: C:\Users\user\Desktop\h40thEqmz6.exeProcess created: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp "C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp" /SL5="$1041E,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe"
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess created: C:\Users\user\Desktop\h40thEqmz6.exe "C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT
Source: C:\Users\user\Desktop\h40thEqmz6.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp "C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp" /SL5="$2042C,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Coat.dll
Source: C:\Users\user\Desktop\h40thEqmz6.exeProcess created: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp "C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp" /SL5="$1041E,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess created: C:\Users\user\Desktop\h40thEqmz6.exe "C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeProcess created: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp "C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp" /SL5="$2042C,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }"Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Coat.dllJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpWindow found: window name: TMainFormJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\File Manager_is1Jump to behavior

Data Obfuscation

barindex
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, ClientSocket.cs.Net Code: Invoke System.AppDomain.Load(byte[])
Source: 6.2.regsvr32.exe.26e130d.2.raw.unpack, ClientSocket.cs.Net Code: Invoke
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, ClientSocket.cs.Net Code: Invoke System.AppDomain.Load(byte[])
Source: 6.2.regsvr32.exe.a5b04d.0.raw.unpack, ClientSocket.cs.Net Code: Invoke
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, ClientSocket.cs.Net Code: Invoke System.AppDomain.Load(byte[])
Source: 6.2.regsvr32.exe.25c0000.1.raw.unpack, ClientSocket.cs.Net Code: Invoke
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }"
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }"Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9305D24 memset,HeapCreate,HeapAlloc,GetLastError,memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,DeleteFileW,HeapFree,GetLastError,HeapFree,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,6_2_00007FF8A9305D24
Source: is-CBKGS.tmp.4.drStatic PE information: real checksum: 0xbefe2 should be: 0xbccc0
Source: is-UGL1J.tmp.4.drStatic PE information: real checksum: 0x0 should be: 0x1237c9
Source: _setup64.tmp.1.drStatic PE information: real checksum: 0x0 should be: 0x8546
Source: h40thEqmz6.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x11ef3f
Source: h40thEqmz6.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x11ef3f
Source: _setup64.tmp.4.drStatic PE information: real checksum: 0x0 should be: 0x8546
Source: h40thEqmz6.exeStatic PE information: real checksum: 0x0 should be: 0xd0662
Source: is-CBKGS.tmp.4.drStatic PE information: section name: .xdata
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026E56C1 push eax; ret 6_2_026E56C9
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026E6E62 push ds; retf 6_2_026E6E6D
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026E6E88 push ds; retf 6_2_026E6E89
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_026E4D62 push eax; ret 6_2_026E4DAC
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF848A800BD pushad ; iretd 6_2_00007FF848A800C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8488AD2A5 pushad ; iretd 7_2_00007FF8488AD2A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C78FC push ebx; retf 7_2_00007FF8489C796A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C435B push es; retf 7_2_00007FF8489C435C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C433B push es; retf 7_2_00007FF8489C433C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C434B push es; retf 7_2_00007FF8489C434C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C78B5 push ebx; retf 7_2_00007FF8489C796A
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C00BD pushad ; iretd 7_2_00007FF8489C00C1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8489C541B pushad ; retf 7_2_00007FF8489C542B
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF84889D2A5 pushad ; iretd 9_2_00007FF84889D2A6
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF8489BAFFA push eax; ret 9_2_00007FF8489BB051
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FF848A80A30 push eax; retf 9_2_00007FF848A80A31
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\Temp\is-PH0LE.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\Desktop\h40thEqmz6.exeFile created: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpJump to dropped file
Source: C:\Users\user\Desktop\h40thEqmz6.exeFile created: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\Temp\is-PH0LE.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Roaming\is-CBKGS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\is-UGL1J.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpFile created: C:\Users\user\AppData\Roaming\Setup_Coat.dll (copy)Jump to dropped file

Boot Survival

barindex
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"

Hooking and other Techniques for Hiding and Protection

barindex
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\h40thEqmz6.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\regsvr32.exeMemory allocated: 2510000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\regsvr32.exeMemory allocated: 1AA30000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6014Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3784Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7466Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2083Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PH0LE.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-PH0LE.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\is-CBKGS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\is-UGL1J.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Setup_Coat.dll (copy)Jump to dropped file
Source: C:\Windows\System32\regsvr32.exeAPI coverage: 2.6 %
Source: C:\Windows\System32\regsvr32.exe TID: 3876Thread sleep time: -39000s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4028Thread sleep count: 6014 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1240Thread sleep count: 3784 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4276Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1772Thread sleep count: 7466 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4744Thread sleep count: 2083 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5908Thread sleep time: -4611686018427385s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: C:\Windows\System32\regsvr32.exeLast function: Thread delayed
Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
Source: h40thEqmz6.tmp, 00000001.00000002.2002841139.000000000084A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
Source: regsvr32.exe, 00000006.00000002.3245978560.000000001B2AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
Source: powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
Source: h40thEqmz6.tmp, 00000001.00000002.2002841139.000000000084A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\_
Source: C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9305D24 memset,HeapCreate,HeapAlloc,GetLastError,memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,DeleteFileW,HeapFree,GetLastError,HeapFree,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,6_2_00007FF8A9305D24
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A934B740 GetProcessHeap,6_2_00007FF8A934B740
Source: C:\Windows\System32\regsvr32.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\regsvr32.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 38.49.56.2 56003Jump to behavior
Source: C:\Windows\System32\regsvr32.exeThread register set: 7160 5Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmpProcess created: C:\Users\user\Desktop\h40thEqmz6.exe "C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENTJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }"Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Coat.dllJump to behavior
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"regsvr32\" -argument \"/s /i:360 c:\users\user\appdata\roaming\setup_coat.dll\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{7a7d6bff-f589-4298-bdda-3bba941a2598}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"regsvr32\" -argument \"/s /i:360 c:\users\user\appdata\roaming\setup_coat.dll\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{7a7d6bff-f589-4298-bdda-3bba941a2598}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\regsvr32.exeCode function: 6_2_00007FF8A9347C00 GetCurrentProcessId,ProcessPrng,HeapFree,CreateNamedPipeW,GetLastError,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,6_2_00007FF8A9347C00
Source: C:\Windows\System32\regsvr32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
1
Masquerading
1
Input Capture
111
Security Software Discovery
Remote Services1
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
212
Process Injection
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop Protocol1
Archive Collected Data
1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Native API
1
DLL Side-Loading
1
Scheduled Task/Job
31
Virtualization/Sandbox Evasion
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
PowerShell
Login Hook1
DLL Side-Loading
212
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets2
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
Obfuscated Files or Information
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Regsvr32
DCSync23
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Software Packing
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
DLL Side-Loading
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1584666 Sample: h40thEqmz6.exe Startdate: 06/01/2025 Architecture: WINDOWS Score: 100 63 Malicious sample detected (through community Yara rule) 2->63 65 Multi AV Scanner detection for dropped file 2->65 67 Multi AV Scanner detection for submitted file 2->67 69 6 other signatures 2->69 12 h40thEqmz6.exe 2 2->12         started        15 regsvr32.exe 2->15         started        process3 file4 57 C:\Users\user\AppData\...\h40thEqmz6.tmp, PE32 12->57 dropped 17 h40thEqmz6.tmp 3 5 12->17         started        process5 file6 43 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 17->43 dropped 45 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 17->45 dropped 20 h40thEqmz6.exe 2 17->20         started        process7 file8 47 C:\Users\user\AppData\...\h40thEqmz6.tmp, PE32 20->47 dropped 23 h40thEqmz6.tmp 22 7 20->23         started        process9 file10 49 C:\Users\user\AppData\Roaming\is-CBKGS.tmp, PE32+ 23->49 dropped 51 C:\Users\user\...\Setup_Coat.dll (copy), PE32+ 23->51 dropped 53 C:\Users\user\AppData\...\unins000.exe (copy), PE32 23->53 dropped 55 3 other files (none is malicious) 23->55 dropped 26 regsvr32.exe 23->26         started        process11 process12 28 regsvr32.exe 5 26->28         started        dnsIp13 59 38.49.56.2, 49730, 49760, 49791 COGENT-174US United States 28->59 71 System process connects to network (likely due to code injection or exploit) 28->71 73 Suspicious powershell command line found 28->73 75 Sets debug register (to hijack the execution of another thread) 28->75 77 Uses Register-ScheduledTask to add task schedules 28->77 32 powershell.exe 37 28->32         started        35 powershell.exe 37 28->35         started        37 regsvr32.exe 28->37         started        signatures14 process15 signatures16 61 Loading BitLocker PowerShell Module 32->61 39 conhost.exe 32->39         started        41 conhost.exe 35->41         started        process17

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
h40thEqmz6.exe64%VirustotalBrowse
h40thEqmz6.exe55%ReversingLabsWin32.Backdoor.Asyncrat
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_shfoldr.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp4%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp4%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\is-PH0LE.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-PH0LE.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\is-UGL1J.tmp4%ReversingLabs
C:\Users\user\AppData\Local\unins000.exe (copy)4%ReversingLabs
C:\Users\user\AppData\Roaming\Setup_Coat.dll (copy)70%ReversingLabsWin64.Trojan.CrypterX
C:\Users\user\AppData\Roaming\is-CBKGS.tmp70%ReversingLabsWin64.Trojan.CrypterX
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.innosetup.com/h40thEqmz6.exe, 00000000.00000003.1996919927.00000000023D0000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.exe, 00000000.00000003.1997111463.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.tmp, 00000001.00000000.1997652661.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-UGL1J.tmp.4.dr, h40thEqmz6.tmp.0.dr, h40thEqmz6.tmp.2.drfalse
    high
    http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.2096777613.000001D2BE6CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpfalse
      high
      https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000007.00000002.2065758420.000001D2AE888000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000007.00000002.2065758420.000001D2AE888000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.2096777613.000001D2BE6CF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.microsoft.copowershell.exe, 00000009.00000002.2226315650.000002C4244A0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Licensepowershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000009.00000002.2211891666.000002C41BCAE000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://aka.ms/pscore68powershell.exe, 00000007.00000002.2065758420.000001D2AE661000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BC41000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.remobjects.com/psh40thEqmz6.exe, 00000000.00000003.1996919927.00000000023D0000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.exe, 00000000.00000003.1997111463.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, h40thEqmz6.tmp, 00000001.00000000.1997652661.0000000000401000.00000020.00000001.01000000.00000004.sdmp, is-UGL1J.tmp.4.dr, h40thEqmz6.tmp.0.dr, h40thEqmz6.tmp.2.drfalse
                              high
                              https://docs.rs/getrandom#nodejs-es-module-support/rust/depsh40thEqmz6.tmp, 00000004.00000003.2007225545.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, regsvr32.exe, 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmp, is-CBKGS.tmp.4.drfalse
                                high
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.2065758420.000001D2AE661000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.2141845247.000002C40BC41000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/Pester/Pesterpowershell.exe, 00000009.00000002.2141845247.000002C40BE68000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    38.49.56.2
                                    unknownUnited States
                                    174COGENT-174UStrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1584666
                                    Start date and time:2025-01-06 07:39:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 56s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:15
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:h40thEqmz6.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:c344f9de1aa1bf284d8281aff7b216ca85b2dde7fc05e1d13b5abcef37d4ca0d.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@20/22@0/1
                                    EGA Information:
                                    • Successful, ratio: 33.3%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 33
                                    • Number of non-executed functions: 192
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target powershell.exe, PID 2000 because it is empty
                                    • Execution Graph export aborted for target powershell.exe, PID 6024 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtCreateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    01:39:57API Interceptor45x Sleep call for process: powershell.exe modified
                                    01:41:17API Interceptor14x Sleep call for process: regsvr32.exe modified
                                    07:40:09Task SchedulerRun new task: MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598} path: regsvr32 s>/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    COGENT-174US3.elfGet hashmaliciousUnknownBrowse
                                    • 38.162.130.105
                                    i686.elfGet hashmaliciousMiraiBrowse
                                    • 38.60.221.89
                                    Fantazy.spc.elfGet hashmaliciousUnknownBrowse
                                    • 38.196.127.211
                                    Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                    • 38.227.136.220
                                    Fantazy.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 38.48.114.39
                                    momo.mips.elfGet hashmaliciousMiraiBrowse
                                    • 206.1.21.164
                                    momo.mpsl.elfGet hashmaliciousMiraiBrowse
                                    • 206.1.21.186
                                    momo.arm7.elfGet hashmaliciousMiraiBrowse
                                    • 149.52.60.238
                                    z0r0.x86.elfGet hashmaliciousMiraiBrowse
                                    • 149.30.141.192
                                    4.elfGet hashmaliciousUnknownBrowse
                                    • 38.176.131.73
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    C:\Users\user\AppData\Local\Temp\is-IC11J.tmp\_isetup\_setup64.tmp8n26gvrXUM.exeGet hashmaliciousUnknownBrowse
                                      8n26gvrXUM.exeGet hashmaliciousUnknownBrowse
                                        4iogI3WCTh.exeGet hashmaliciousGhostRatBrowse
                                          setup.exeGet hashmaliciousUnknownBrowse
                                            RXxeYma4d5.exeGet hashmaliciousGhostRatBrowse
                                              017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
                                                vc8Kx5C54G.exeGet hashmaliciousSocks5SystemzBrowse
                                                  AbC0LBkVhr.exeGet hashmaliciousSocks5SystemzBrowse
                                                    Mg5bMQ2lWi.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                      KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:modified
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Preview:@...e...........................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):60
                                                        Entropy (8bit):4.038920595031593
                                                        Encrypted:false
                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                        Malicious:false
                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6144
                                                        Entropy (8bit):4.215994423157539
                                                        Encrypted:false
                                                        SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                        MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                        SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                        SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                        SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Joe Sandbox View:
                                                        • Filename: 8n26gvrXUM.exe, Detection: malicious, Browse
                                                        • Filename: 8n26gvrXUM.exe, Detection: malicious, Browse
                                                        • Filename: 4iogI3WCTh.exe, Detection: malicious, Browse
                                                        • Filename: setup.exe, Detection: malicious, Browse
                                                        • Filename: RXxeYma4d5.exe, Detection: malicious, Browse
                                                        • Filename: 017069451a4dbc523a1165a2f1bd361a762bb40856778.exe, Detection: malicious, Browse
                                                        • Filename: vc8Kx5C54G.exe, Detection: malicious, Browse
                                                        • Filename: AbC0LBkVhr.exe, Detection: malicious, Browse
                                                        • Filename: Mg5bMQ2lWi.exe, Detection: malicious, Browse
                                                        • Filename: KRdh0OaXqH.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):23312
                                                        Entropy (8bit):4.596242908851566
                                                        Encrypted:false
                                                        SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\h40thEqmz6.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1160704
                                                        Entropy (8bit):6.385672321945446
                                                        Encrypted:false
                                                        SSDEEP:24576:cYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9fX:nGUhni7iSFCQ6R
                                                        MD5:8FDC58C7D4C59472615682D6DEA9D190
                                                        SHA1:8E131FE09FD238493719B4FD92E6C833BF3596C1
                                                        SHA-256:26A5BE637EE680B1EC11D1ADF2FD0972CC52078CBD200D9273F8BB826707C83B
                                                        SHA-512:B05B9FD8FF3D627B562CBD2968466FB54ADBC2FA5591EBE803300A3C5EF7887BC1761D8013B47AAB0F5387265C8B7B15078A01ABB75D4C3180671780181EBE24
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 4%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                        Process:C:\Users\user\Desktop\h40thEqmz6.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1160704
                                                        Entropy (8bit):6.385672321945446
                                                        Encrypted:false
                                                        SSDEEP:24576:cYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9fX:nGUhni7iSFCQ6R
                                                        MD5:8FDC58C7D4C59472615682D6DEA9D190
                                                        SHA1:8E131FE09FD238493719B4FD92E6C833BF3596C1
                                                        SHA-256:26A5BE637EE680B1EC11D1ADF2FD0972CC52078CBD200D9273F8BB826707C83B
                                                        SHA-512:B05B9FD8FF3D627B562CBD2968466FB54ADBC2FA5591EBE803300A3C5EF7887BC1761D8013B47AAB0F5387265C8B7B15078A01ABB75D4C3180671780181EBE24
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 4%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp
                                                        File Type:PE32+ executable (console) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6144
                                                        Entropy (8bit):4.215994423157539
                                                        Encrypted:false
                                                        SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                        MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                        SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                        SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                        SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):23312
                                                        Entropy (8bit):4.596242908851566
                                                        Encrypted:false
                                                        SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                        MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                        SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                        SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                        SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\regsvr32.exe
                                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                        Category:dropped
                                                        Size (bytes):65792
                                                        Entropy (8bit):7.9404734296406705
                                                        Encrypted:false
                                                        SSDEEP:1536:VhjcgGtMmfTymU88f4gtzyV+5klZq8BNP3DH+xbMf8KK/q47xtg:73dmUFffze+5oZq8BNP3T+u0fq4la
                                                        MD5:3CCD20FE879B0B5E5027AF5616BA1523
                                                        SHA1:9A32505698713F1217970DEE2CFADF01D658FF26
                                                        SHA-256:39ADBB8DA7F27F5E1C5A2469DE371C8824C89FE2584318A604E8D2875A31762A
                                                        SHA-512:442414566E24C6B50B831310431B6402032C34E8B5F0E11B7DD0B85380119352EB0BD35901820CC578F6F9B95ECAD1273DD396273ACFC01EC0C731182D80BBE9
                                                        Malicious:false
                                                        Preview:PK.........I.Y`O1.\....A......second_data.bin.\y\....F...>&.nrt!..6)7..].I..B.Q.Q.T.Q.7.b.+.+7Kd....?+..K2...;e.{_......?....|....3.J':...i..b...j.YB.D.7<....`{iT.V.v.U...km.......,../.ug..'.y..l.L.o/?u.,....7...=....>.F%o.\:......._.v.d.%_...r......V.<..1.....$.Iwgg.....g?q}.te5....O.....+..kJj...x..^.m:..........W0.:6.....&..v....uh.... ...I...oY....v...,.<.t.l..,..,.......n^..w-t7.h{5wl.._L.p&=.y...V......N..Q2x...[..u.w...i\.=+lT.MWe......_:w.z....|..e....n...x.?....Z....j..1...;kH..g..h.....Tn.7o...1g........q.\.^Lc./...........MuO..Y....f.\..|...s..../....N.^$sut..........v.k..-...]..K.[_X...Yo...v..5.n...'-z...bm..S......ZoQ.e...g............^...}......G..=?&....[<.?.....^...r..Rh..|.5% ......O.?......p............K..d'....~.Fj.....N.y...Sg....b.<.'f.A"....._\.nH...F.~.R.....R...:.>j.....4..`...Gf....../........O.?....=..S....>.t..+g..]..............O.M...D.ce........G=.K...Q./... .......0l..>^_,.9G\.m....7}tgt
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1183079
                                                        Entropy (8bit):6.3580271187790665
                                                        Encrypted:false
                                                        SSDEEP:24576:UYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9f6:vGUhni7iSFCQ6I
                                                        MD5:B91B57B07E702422FC8755CAEA84A80A
                                                        SHA1:B3E23888DC152B60D7E8AD4472EB3B1262AD1593
                                                        SHA-256:4DDD13BE04F6EA9B83119DE95095887E47961F1DAC08C13978124BF8EEACFE36
                                                        SHA-512:7AD7ED98F635C3B870370F56A0E7370C64D66C9FB7508843CC1C6D1FE06BD2D565DFD2BBC5F951A3878B9F3BB93EAEBCE2C0B8C79CDC66158174FE21D703AF55
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 4%
                                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:InnoSetup Log File Manager, version 0x418, 3453 bytes, 715575\37\user\37, C:\Users\user\AppData\Local\376\377\377\
                                                        Category:dropped
                                                        Size (bytes):3453
                                                        Entropy (8bit):3.756044815307064
                                                        Encrypted:false
                                                        SSDEEP:96:/8M41dblhcpvwvJu82tiKiC6bufc1AGlEDA4MZAe2L/uHhcH:/8M41dphcpvcJu1i2f7fDSm/uHK
                                                        MD5:06D2834692BB9FF57ECEC081E91CC588
                                                        SHA1:4ECBD2A6299273BFE6B1D8BE3963DC47B30569CF
                                                        SHA-256:C0950CE942FBD24B0BE10FD668C350517ED61B7175AD8FF0A1D8D3502B33CFEA
                                                        SHA-512:81E955BC934954028C9A61B467C3B067498AD184E1485C37AC5E6372B61D9F8AC876C11D4E029A041FDD327E28DCD85CF2A6522FA774B4F7606C6798065C544F
                                                        Malicious:false
                                                        Preview:Inno Setup Uninstall Log (b)....................................File Manager....................................................................................................................File Manager............................................................................................................................}...%.................................................................................................................{D....N...Veq.......w........7.1.5.5.7.5......a.l.f.o.n.s......C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l................'.7.1.. ..............IFPS...............................................................................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.................!MAIN....-1..(...dll:shell32.dll.ShellExecuteW........................HASCMDLINEPARAM....26 @16..PARAMCOUNT.......COMPARETEXT.........PARAMSTR...........E.......INITIALI
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1183079
                                                        Entropy (8bit):6.3580271187790665
                                                        Encrypted:false
                                                        SSDEEP:24576:UYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9f6:vGUhni7iSFCQ6I
                                                        MD5:B91B57B07E702422FC8755CAEA84A80A
                                                        SHA1:B3E23888DC152B60D7E8AD4472EB3B1262AD1593
                                                        SHA-256:4DDD13BE04F6EA9B83119DE95095887E47961F1DAC08C13978124BF8EEACFE36
                                                        SHA-512:7AD7ED98F635C3B870370F56A0E7370C64D66C9FB7508843CC1C6D1FE06BD2D565DFD2BBC5F951A3878B9F3BB93EAEBCE2C0B8C79CDC66158174FE21D703AF55
                                                        Malicious:false
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 4%
                                                        Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                        Process:C:\Windows\System32\regsvr32.exe
                                                        File Type:ASCII text
                                                        Category:modified
                                                        Size (bytes):8
                                                        Entropy (8bit):2.75
                                                        Encrypted:false
                                                        SSDEEP:3:Rt:v
                                                        MD5:CF759E4C5F14FE3EEC41B87ED756CEA8
                                                        SHA1:C27C796BB3C2FAC929359563676F4BA1FFADA1F5
                                                        SHA-256:C9F9F193409217F73CC976AD078C6F8BF65D3AABCF5FAD3E5A47536D47AA6761
                                                        SHA-512:C7F832AEE13A5EB36D145F35D4464374A9E12FA2017F3C2257442D67483B35A55ECCAE7F7729243350125B37033E075EFBC2303839FD86B81B9B4DCA3626953B
                                                        Malicious:false
                                                        Preview:.5.False
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):742210
                                                        Entropy (8bit):6.671551706055973
                                                        Encrypted:false
                                                        SSDEEP:12288:qSrdNvS+RGF3NPFH+CWigVHFMkDehBGpETe5u+:qibpkF3VFe8wFwcqTe5u+
                                                        MD5:6D3053A6F23CB5B6BD374CEA07715AE8
                                                        SHA1:8BCB4C3D4D2D6A22B7AF3382BFA38354244011E1
                                                        SHA-256:5A6A75AE667580AB68530D72A351E906204514AABB4ACD241D31FA6E18D45B58
                                                        SHA-512:A7C135CFC1CE5BA9ECBCDBA5F1698545CF16EAED5800BB63BDBBB995DA1A8726BEE79BDD4E4DD1B00671EB10A45BAF34466CF0FDF3FC2C1A906AEFCA3BEF5855
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 70%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...!.[K.X........&"...*.....T......0.....................................................`... .................................................................( ..............................................(...................................................text...............................`..`.data... .... ......................@....rdata..`....0......................@..@.pdata..( ......."..................@..@.xdata...G... ...H..................@..@.bss....`....p...........................edata...............6..............@..@.idata...............8..............@....CRT....`............N..............@....tls.................P..............@....reloc...............R..............@..B........................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                        Category:dropped
                                                        Size (bytes):742210
                                                        Entropy (8bit):6.671551706055973
                                                        Encrypted:false
                                                        SSDEEP:12288:qSrdNvS+RGF3NPFH+CWigVHFMkDehBGpETe5u+:qibpkF3VFe8wFwcqTe5u+
                                                        MD5:6D3053A6F23CB5B6BD374CEA07715AE8
                                                        SHA1:8BCB4C3D4D2D6A22B7AF3382BFA38354244011E1
                                                        SHA-256:5A6A75AE667580AB68530D72A351E906204514AABB4ACD241D31FA6E18D45B58
                                                        SHA-512:A7C135CFC1CE5BA9ECBCDBA5F1698545CF16EAED5800BB63BDBBB995DA1A8726BEE79BDD4E4DD1B00671EB10A45BAF34466CF0FDF3FC2C1A906AEFCA3BEF5855
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 70%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...!.[K.X........&"...*.....T......0.....................................................`... .................................................................( ..............................................(...................................................text...............................`..`.data... .... ......................@....rdata..`....0......................@..@.pdata..( ......."..................@..@.xdata...G... ...H..................@..@.bss....`....p...........................edata...............6..............@..@.idata...............8..............@....CRT....`............N..............@....tls.................P..............@....reloc...............R..............@..B........................................................................................................................................................................
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.857829913884461
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 98.86%
                                                        • Inno Setup installer (109748/4) 1.08%
                                                        • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        File name:h40thEqmz6.exe
                                                        File size:830'528 bytes
                                                        MD5:e3ae2dc9b8b0582a266871b52e85c36f
                                                        SHA1:f783d1d0354bf3ad1dc4e506e4df3250a89ee765
                                                        SHA256:c344f9de1aa1bf284d8281aff7b216ca85b2dde7fc05e1d13b5abcef37d4ca0d
                                                        SHA512:c670e3d4bd63e054ca9d70ff1588e1c263cf73ca24f1be6f9cde9222e6c351b87e9c2855b42c50f5b92eea7e683ec62b67a2e7c2a0dae1a29e080113435ad438
                                                        SSDEEP:24576:qMjhsJkMwFz7D6h0lgoyM3VcH17lpMbTuIGVaiM2a:5zZFDaoIpMHGVa52a
                                                        TLSH:74050202B3C30475E2550978DC56C498AD277D7929E4643B3EF8FB4F0A792C3AC7AA61
                                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                        Icon Hash:b8868baba9aba2d8
                                                        Entrypoint:0x416478
                                                        Entrypoint Section:.itext
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x43D9DEF9 [Fri Jan 27 08:51:05 2006 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:0
                                                        File Version Major:5
                                                        File Version Minor:0
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:0
                                                        Import Hash:483f0c4259a9148c34961abbda6146c1
                                                        Instruction
                                                        push ebp
                                                        mov ebp, esp
                                                        add esp, FFFFFFA4h
                                                        push ebx
                                                        push esi
                                                        push edi
                                                        xor eax, eax
                                                        mov dword ptr [ebp-3Ch], eax
                                                        mov dword ptr [ebp-40h], eax
                                                        mov dword ptr [ebp-5Ch], eax
                                                        mov dword ptr [ebp-30h], eax
                                                        mov dword ptr [ebp-38h], eax
                                                        mov dword ptr [ebp-34h], eax
                                                        mov dword ptr [ebp-2Ch], eax
                                                        mov dword ptr [ebp-28h], eax
                                                        mov dword ptr [ebp-14h], eax
                                                        mov eax, 004152B8h
                                                        call 00007F1CBCE75771h
                                                        xor eax, eax
                                                        push ebp
                                                        push 00416B45h
                                                        push dword ptr fs:[eax]
                                                        mov dword ptr fs:[eax], esp
                                                        xor edx, edx
                                                        push ebp
                                                        push 00416B01h
                                                        push dword ptr fs:[edx]
                                                        mov dword ptr fs:[edx], esp
                                                        mov eax, dword ptr [0041AB48h]
                                                        call 00007F1CBCE8401Bh
                                                        call 00007F1CBCE83BC2h
                                                        lea edx, dword ptr [ebp-14h]
                                                        xor eax, eax
                                                        call 00007F1CBCE7D844h
                                                        mov edx, dword ptr [ebp-14h]
                                                        mov eax, 0041D6E8h
                                                        call 00007F1CBCE73DA7h
                                                        push 00000002h
                                                        push 00000000h
                                                        push 00000001h
                                                        mov ecx, dword ptr [0041D6E8h]
                                                        mov dl, 01h
                                                        mov eax, dword ptr [0040F080h]
                                                        call 00007F1CBCE7E12Fh
                                                        mov dword ptr [0041D6ECh], eax
                                                        xor edx, edx
                                                        push ebp
                                                        push 00416AADh
                                                        push dword ptr fs:[edx]
                                                        mov dword ptr fs:[edx], esp
                                                        call 00007F1CBCE840A3h
                                                        mov dword ptr [0041D6F4h], eax
                                                        mov eax, dword ptr [0041D6F4h]
                                                        cmp dword ptr [eax+0Ch], 01h
                                                        jne 00007F1CBCE8540Ah
                                                        mov eax, dword ptr [0041D6F4h]
                                                        mov edx, 00000028h
                                                        call 00007F1CBCE7E5F8h
                                                        mov edx, dword ptr [0041D6F4h]
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x1e0000xf9e.idata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000xb230.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x200000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x1e3500x24c.idata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x143f80x14400c9bb3afc1ceaaa31127ccfa204c657efFalse0.5487316743827161data6.482216817915366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .itext0x160000xbe80xc001ba5adf2e1058c0460dcc814ba86fb32False0.6246744791666666data6.005798728198158IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .data0x170000xd9c0xe00d5b22eff9e08edaa95f493c1a71158c0False0.2924107142857143data2.669288666959085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .bss0x180000x574c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .idata0x1e0000xf9e0x1000b47eaca4c149ee829de76a342b5560d5False0.35595703125data4.9677831942996935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .tls0x1f0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rdata0x200000x180x2003746f5876803f8f30db5bb2deb8772aeFalse0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .rsrc0x210000xb2300xb40089570a05fb7d8e1f4d603c10908743c6False0.1633029513888889data3.9726454947924217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x213ec0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.16532258064516128
                                                        RT_ICON0x216d40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.32094594594594594
                                                        RT_ICON0x217fc0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.18310234541577824
                                                        RT_STRING0x226a40xc4data0.5969387755102041
                                                        RT_STRING0x227680xccdata0.6225490196078431
                                                        RT_STRING0x228340x174data0.5510752688172043
                                                        RT_STRING0x229a80x39cdata0.34523809523809523
                                                        RT_STRING0x22d440x34cdata0.4218009478672986
                                                        RT_STRING0x230900x294data0.4106060606060606
                                                        RT_RCDATA0x233240x82e8dataEnglishUnited States0.11261637622344235
                                                        RT_RCDATA0x2b60c0x10data1.5
                                                        RT_RCDATA0x2b61c0x1a0data0.8149038461538461
                                                        RT_RCDATA0x2b7bc0x2cdata1.1818181818181819
                                                        RT_GROUP_ICON0x2b7e80x30dataEnglishUnited States0.9583333333333334
                                                        RT_VERSION0x2b8180x4b8COM executable for DOSEnglishUnited States0.3079470198675497
                                                        RT_MANIFEST0x2bcd00x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                        DLLImport
                                                        oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                        user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                                        kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                                        kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                                        user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                                        kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, LeaveCriticalSection, InitializeCriticalSection, GetWindowsDirectoryW, GetVersionExW, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                                                        advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                                        comctl32.dllInitCommonControls
                                                        kernel32.dllSleep
                                                        advapi32.dllAdjustTokenPrivileges
                                                        oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Jan 6, 2025 07:40:22.568852901 CET4973056005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:22.573673010 CET560054973038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:22.573760986 CET4973056005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:22.595937967 CET4973056005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:22.600724936 CET560054973038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:24.133285999 CET560054973038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:24.133344889 CET4973056005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:27.157881975 CET4973056005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:27.158145905 CET4976056003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:27.162734985 CET560054973038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:27.162934065 CET560034976038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:27.163007021 CET4976056003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:27.163230896 CET4976056003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:27.167983055 CET560034976038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:28.745599985 CET560034976038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:28.745676994 CET4976056003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:31.756373882 CET4976056003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:31.756727934 CET4979156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:31.761295080 CET560034976038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:31.761615038 CET560034979138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:31.761718035 CET4979156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:31.762007952 CET4979156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:31.766762018 CET560034979138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:33.358537912 CET560034979138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:33.358617067 CET4979156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:36.374108076 CET4979156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:36.374310017 CET4982256004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:36.378978968 CET560034979138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:36.379076004 CET560044982238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:36.379143000 CET4982256004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:36.379453897 CET4982256004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:36.385425091 CET560044982238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:37.965572119 CET560044982238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:37.965840101 CET4982256004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:40.983058929 CET4982256004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:40.983315945 CET4985356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:40.987960100 CET560044982238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:40.988146067 CET560054985338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:40.988214016 CET4985356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:40.988487959 CET4985356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:40.993247986 CET560054985338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:42.555932999 CET560054985338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:42.556036949 CET4985356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:45.561927080 CET4988456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:45.561955929 CET4985356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:45.566773891 CET560044988438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:45.566797018 CET560054985338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:45.567162037 CET4988456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:45.567162037 CET4988456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:45.571990967 CET560044988438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:47.135374069 CET560044988438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:47.137052059 CET4988456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:50.139780045 CET4988456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:50.140096903 CET4991556003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:50.144643068 CET560044988438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:50.144901037 CET560034991538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:50.144978046 CET4991556003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:50.145220041 CET4991556003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:50.149966002 CET560034991538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:51.732172012 CET560034991538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:51.732243061 CET4991556003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:54.750894070 CET4991556003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:54.751167059 CET4994756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:54.755759954 CET560034991538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:54.755990982 CET560034994738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:54.756063938 CET4994756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:54.756257057 CET4994756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:54.761039019 CET560034994738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:56.304416895 CET560034994738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:56.306467056 CET4994756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:59.328006029 CET4994756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:59.328383923 CET4997856003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:59.332842112 CET560034994738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:59.333422899 CET560034997838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:40:59.333503962 CET4997856003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:59.333909035 CET4997856003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:40:59.339107037 CET560034997838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:00.920564890 CET560034997838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:00.923000097 CET4997856003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:03.944845915 CET4997856003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:03.945486069 CET4998656005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:03.949743032 CET560034997838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:03.950270891 CET560054998638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:03.950330019 CET4998656005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:03.953104019 CET4998656005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:03.957923889 CET560054998638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:05.529438972 CET560054998638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:05.530972958 CET4998656005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:08.545628071 CET4998656005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:08.545928955 CET4998756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:08.550443888 CET560054998638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:08.550755024 CET560034998738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:08.550825119 CET4998756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:08.551183939 CET4998756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:08.556005955 CET560034998738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:10.153489113 CET560034998738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:10.153563023 CET4998756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:13.171339989 CET4998756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:13.171648979 CET4998856004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:13.176122904 CET560034998738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:13.176486015 CET560044998838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:13.176568031 CET4998856004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:13.176826000 CET4998856004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:13.181601048 CET560044998838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:14.762873888 CET560044998838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:14.762939930 CET4998856004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:17.780132055 CET4998856004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:17.780425072 CET4999056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:17.784904003 CET560044998838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:17.785238028 CET560044999038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:17.785315990 CET4999056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:17.785598993 CET4999056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:17.790460110 CET560044999038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:19.352812052 CET560044999038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:19.352901936 CET4999056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:22.061351061 CET4999056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:22.061675072 CET4999156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:22.066191912 CET560044999038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:22.066508055 CET560034999138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:22.066607952 CET4999156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:22.066981077 CET4999156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:22.071872950 CET560034999138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:23.656661034 CET560034999138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:23.656737089 CET4999156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:26.092159033 CET4999156003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:26.092469931 CET4999256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:26.096982956 CET560034999138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:26.097265005 CET560034999238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:26.097376108 CET4999256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:26.097629070 CET4999256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:26.102464914 CET560034999238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:27.665407896 CET560034999238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:27.665467978 CET4999256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:29.861370087 CET4999256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:29.861675978 CET4999356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:29.866158009 CET560034999238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:29.866487980 CET560054999338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:29.866563082 CET4999356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:29.866835117 CET4999356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:29.871588945 CET560054999338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:31.451705933 CET560054999338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:31.451843977 CET4999356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:33.436389923 CET4999356005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:33.436698914 CET4999456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:33.441231966 CET560054999338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:33.441485882 CET560044999438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:33.441580057 CET4999456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:33.441836119 CET4999456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:33.446592093 CET560044999438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:35.028593063 CET560044999438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:35.030992985 CET4999456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:36.810775995 CET4999456004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:36.811084032 CET4999556004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:36.815578938 CET560044999438.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:36.815936089 CET560044999538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:36.816024065 CET4999556004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:36.816303968 CET4999556004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:36.821110010 CET560044999538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:38.384536982 CET560044999538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:38.384608030 CET4999556004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:39.983191967 CET4999556004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:39.983505964 CET4999656004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:39.988022089 CET560044999538.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:39.988334894 CET560044999638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:39.988409996 CET4999656004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:39.988682032 CET4999656004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:39.993459940 CET560044999638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:41.577686071 CET560044999638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:41.577775002 CET4999656004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:43.030416012 CET4999656004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:43.031359911 CET4999756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:43.035296917 CET560044999638.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:43.036220074 CET560034999738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:43.036288977 CET4999756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:43.036597967 CET4999756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:43.041336060 CET560034999738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:44.605326891 CET560034999738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:44.605422020 CET4999756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:45.904783964 CET4999756003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:45.905134916 CET4999856005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:45.909594059 CET560034999738.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:45.909904003 CET560054999838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:45.909976959 CET4999856005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:45.910274029 CET4999856005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:45.915040970 CET560054999838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:47.480140924 CET560054999838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:47.480206013 CET4999856005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:48.654660940 CET4999856005192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:48.654943943 CET4999956004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:48.659492970 CET560054999838.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:48.660108089 CET560044999938.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:48.660207987 CET4999956004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:48.660449028 CET4999956004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:48.665184021 CET560044999938.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:50.232240915 CET560044999938.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:50.232428074 CET4999956004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:51.295789957 CET4999956004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:51.296108961 CET5000056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:51.300604105 CET560044999938.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:51.300915956 CET560045000038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:51.300995111 CET5000056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:51.301249981 CET5000056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:51.306010008 CET560045000038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:52.886941910 CET560045000038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:52.887025118 CET5000056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:53.842081070 CET5000056004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:53.842356920 CET5000156004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:53.847908020 CET560045000038.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:53.848026991 CET560045000138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:53.848107100 CET5000156004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:53.848351002 CET5000156004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:53.853156090 CET560045000138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:55.416244030 CET560045000138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:55.416310072 CET5000156004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:56.280378103 CET5000156004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:56.280687094 CET5000256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:56.285213947 CET560045000138.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:56.285525084 CET560035000238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:56.285598040 CET5000256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:56.285989046 CET5000256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:56.290761948 CET560035000238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:57.872776031 CET560035000238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:57.872858047 CET5000256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:58.643579006 CET5000256003192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:58.643868923 CET5000356004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:58.648546934 CET560035000238.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:58.648663044 CET560045000338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:41:58.648749113 CET5000356004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:58.648988008 CET5000356004192.168.2.538.49.56.2
                                                        Jan 6, 2025 07:41:58.653776884 CET560045000338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:42:00.233609915 CET560045000338.49.56.2192.168.2.5
                                                        Jan 6, 2025 07:42:00.233680964 CET5000356004192.168.2.538.49.56.2

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:01:39:54
                                                        Start date:06/01/2025
                                                        Path:C:\Users\user\Desktop\h40thEqmz6.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\h40thEqmz6.exe"
                                                        Imagebase:0x400000
                                                        File size:830'528 bytes
                                                        MD5 hash:E3AE2DC9B8B0582A266871B52E85C36F
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Borland Delphi
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:01:39:54
                                                        Start date:06/01/2025
                                                        Path:C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-J5IQG.tmp\h40thEqmz6.tmp" /SL5="$1041E,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe"
                                                        Imagebase:0x400000
                                                        File size:1'160'704 bytes
                                                        MD5 hash:8FDC58C7D4C59472615682D6DEA9D190
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Borland Delphi
                                                        Antivirus matches:
                                                        • Detection: 4%, ReversingLabs
                                                        • Detection: 0%, Virustotal, Browse
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:01:39:54
                                                        Start date:06/01/2025
                                                        Path:C:\Users\user\Desktop\h40thEqmz6.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT
                                                        Imagebase:0x400000
                                                        File size:830'528 bytes
                                                        MD5 hash:E3AE2DC9B8B0582A266871B52E85C36F
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Borland Delphi
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:01:39:54
                                                        Start date:06/01/2025
                                                        Path:C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\is-KTUSV.tmp\h40thEqmz6.tmp" /SL5="$2042C,450685,141312,C:\Users\user\Desktop\h40thEqmz6.exe" /VERYSILENT
                                                        Imagebase:0x400000
                                                        File size:1'160'704 bytes
                                                        MD5 hash:8FDC58C7D4C59472615682D6DEA9D190
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:Borland Delphi
                                                        Antivirus matches:
                                                        • Detection: 4%, ReversingLabs
                                                        • Detection: 0%, Virustotal, Browse
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:01:39:55
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\SysWOW64\regsvr32.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
                                                        Imagebase:0x740000
                                                        File size:20'992 bytes
                                                        MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:6
                                                        Start time:01:39:55
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\regsvr32.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:/s /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
                                                        Imagebase:0x7ff64f590000
                                                        File size:25'088 bytes
                                                        MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice, Description: Detects executables attemping to enumerate video devices using WMI, Source: 00000006.00000002.3245140417.00000000025C0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000006.00000002.3244688637.0000000000A3B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:7
                                                        Start time:01:39:55
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll' }) { exit 0 } else { exit 1 }"
                                                        Imagebase:0x7ff7be880000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:01:39:55
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:01:40:06
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{7A7D6BFF-F589-4298-BDDA-3BBA941A2598}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                        Imagebase:0x7ff7be880000
                                                        File size:452'608 bytes
                                                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:01:40:06
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:01:40:09
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\regsvr32.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\user\AppData\Roaming\Setup_Coat.dll
                                                        Imagebase:0x7ff64f590000
                                                        File size:25'088 bytes
                                                        MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:01:40:18
                                                        Start date:06/01/2025
                                                        Path:C:\Windows\System32\regsvr32.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Coat.dll
                                                        Imagebase:0x7ff64f590000
                                                        File size:25'088 bytes
                                                        MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:3.8%
                                                          Dynamic/Decrypted Code Coverage:4%
                                                          Signature Coverage:64.3%
                                                          Total number of Nodes:1325
                                                          Total number of Limit Nodes:46
                                                          execution_graph 59038 7ff848a82f0d 59039 7ff848a82f3f SetWindowsHookExW 59038->59039 59041 7ff848a82ff1 59039->59041 59125 7ff8a9301e80 59130 7ff8a9301ec8 59125->59130 59126 7ff8a9302376 59706 7ff8a933d070 59126->59706 59129 7ff8a93023e4 59729 7ff8a932dc40 50 API calls 59129->59729 59130->59126 59131 7ff8a9301f73 59130->59131 59134 7ff8a933b920 50 API calls 59130->59134 59136 7ff8a9320d40 52 API calls 59131->59136 59134->59130 59135 7ff8a930242c 59497 7ff8a933d340 59135->59497 59138 7ff8a9301fcd 59136->59138 59704 7ff8a932dc40 50 API calls 59138->59704 59141 7ff8a93025a6 59144 7ff8a930276e 59141->59144 59148 7ff8a9302605 HeapFree 59141->59148 59142 7ff8a9302618 59143 7ff8a9307681 59142->59143 59145 7ff8a934b740 2 API calls 59142->59145 59748 7ff8a9308d80 49 API calls 59143->59748 59147 7ff8a930277d HeapFree 59144->59147 59164 7ff8a9302805 59144->59164 59151 7ff8a930267d 59145->59151 59146 7ff8a9302483 59152 7ff8a93024a6 59146->59152 59153 7ff8a9302522 HeapFree 59146->59153 59147->59164 59148->59141 59149 7ff8a9320d40 52 API calls 59154 7ff8a93024c3 59149->59154 59151->59143 59162 7ff8a9302686 59151->59162 59152->59135 59159 7ff8a9302540 HeapFree 59152->59159 59153->59152 59154->59146 59730 7ff8a932dc40 50 API calls 59154->59730 59155 7ff8a9302364 59155->59126 59163 7ff8a933b920 50 API calls 59155->59163 59157 7ff8a9320d40 52 API calls 59165 7ff8a9301fda 59157->59165 59159->59135 59160 7ff8a933d340 50 API calls 59160->59162 59161 7ff8a9307edc 59166 7ff8a9301770 64 API calls 59161->59166 59162->59160 59176 7ff8a9302798 59162->59176 59163->59126 59168 7ff8a93029e3 59164->59168 59181 7ff8a9308f90 51 API calls 59164->59181 59165->59155 59165->59157 59173 7ff8a93224f0 50 API calls 59165->59173 59177 7ff8a9302468 59165->59177 59183 7ff8a933b920 50 API calls 59165->59183 59705 7ff8a932dc40 50 API calls 59165->59705 59174 7ff8a9307ee9 59166->59174 59167 7ff8a9302a14 59171 7ff8a9302a23 HeapFree 59167->59171 59172 7ff8a9306faa 59167->59172 59168->59167 59170 7ff8a9302a01 HeapFree 59168->59170 59170->59168 59171->59172 59173->59165 59775 7ff8a9301660 HeapFree 59174->59775 59175 7ff8a93027e4 59175->59164 59180 7ff8a93027ef HeapFree 59175->59180 59176->59175 59179 7ff8a93027d1 HeapFree 59176->59179 59177->59146 59177->59149 59179->59176 59180->59164 59184 7ff8a930295f 59181->59184 59182 7ff8a9307f20 59187 7ff8a930814a 59182->59187 59188 7ff8a9307ffa HeapFree 59182->59188 59183->59165 59185 7ff8a9302977 CreateMutexA GetLastError 59184->59185 59186 7ff8a9307704 59184->59186 59189 7ff8a9302a3e 59185->59189 59190 7ff8a93029ab 59185->59190 59751 7ff8a930b610 49 API calls 59186->59751 59776 7ff8a9301660 HeapFree 59187->59776 59188->59187 59506 7ff8a9308830 59189->59506 59190->59168 59193 7ff8a93029c0 HeapFree 59190->59193 59193->59168 59194 7ff8a9306e59 HeapFree 59194->59161 59196 7ff8a9308157 59198 7ff8a9308204 59196->59198 59200 7ff8a93081ff HeapFree 59196->59200 59197 7ff8a9302d91 59199 7ff8a9308830 54 API calls 59197->59199 59201 7ff8a930820f HeapFree 59198->59201 59202 7ff8a9308225 59198->59202 59203 7ff8a9302d9e 59199->59203 59200->59198 59201->59202 59204 7ff8a9308230 HeapFree 59202->59204 59205 7ff8a9308246 59202->59205 59208 7ff8a9307796 59203->59208 59209 7ff8a9302db9 59203->59209 59204->59205 59206 7ff8a930824f 59205->59206 59213 7ff8a930845b HeapFree 59205->59213 59217 7ff8a930859b HeapFree 59206->59217 59218 7ff8a93087de 59206->59218 59207 7ff8a934b740 2 API calls 59211 7ff8a9302bac 59207->59211 59753 7ff8a930b730 49 API calls 59208->59753 59212 7ff8a9308830 54 API calls 59209->59212 59215 7ff8a9307afb 59211->59215 59233 7ff8a9302bb5 59211->59233 59216 7ff8a9302ddb 59212->59216 59213->59206 59772 7ff8a9308d80 49 API calls 59215->59772 59219 7ff8a93077ae 59216->59219 59220 7ff8a9302dfe 59216->59220 59217->59218 59222 7ff8a93087ee HeapFree 59218->59222 59223 7ff8a93087ff 59218->59223 59754 7ff8a930a6d0 49 API calls 59219->59754 59520 7ff8a93100b0 59220->59520 59222->59223 59777 7ff8a93019f0 HeapFree 59223->59777 59227 7ff8a9302e23 59232 7ff8a93077cb 59227->59232 59239 7ff8a9302e2c 59227->59239 59228 7ff8a9302d4e 59229 7ff8a9302d56 HeapFree 59228->59229 59230 7ff8a9302d69 SetFileAttributesW 59228->59230 59229->59230 59230->59197 59234 7ff8a9302d80 HeapFree 59230->59234 59231 7ff8a930880c 59778 7ff8a9354020 6 API calls 59231->59778 59755 7ff8a930b610 49 API calls 59232->59755 59233->59228 59731 7ff8a9319d60 50 API calls 59233->59731 59234->59197 59238 7ff8a9308814 59239->59194 59569 7ff8a931c890 59239->59569 59241 7ff8a9302ebb 59242 7ff8a931c890 57 API calls 59241->59242 59257 7ff8a9302f74 59242->59257 59243 7ff8a93031b2 59244 7ff8a93031ce 59243->59244 59245 7ff8a93031bd HeapFree 59243->59245 59246 7ff8a9303216 59244->59246 59247 7ff8a9303200 HeapFree 59244->59247 59245->59244 59248 7ff8a9303232 59246->59248 59250 7ff8a9303221 HeapFree 59246->59250 59247->59246 59251 7ff8a9309320 50 API calls 59248->59251 59249 7ff8a9303027 59746 7ff8a93099c0 49 API calls 59249->59746 59250->59248 59256 7ff8a93032a3 59251->59256 59253 7ff8a9303054 59745 7ff8a9309a70 49 API calls 59253->59745 59255 7ff8a9303186 memcpy 59255->59243 59255->59257 59588 7ff8a9321150 59256->59588 59257->59243 59257->59249 59257->59253 59257->59255 59260 7ff8a93077fc 59756 7ff8a930b610 49 API calls 59260->59756 59262 7ff8a9307752 59752 7ff8a930b730 49 API calls 59262->59752 59263 7ff8a9303524 59263->59262 59264 7ff8a93035d2 59263->59264 59266 7ff8a9307a56 59264->59266 59267 7ff8a934b740 2 API calls 59264->59267 59270 7ff8a9303604 59264->59270 59764 7ff8a9308d80 49 API calls 59266->59764 59269 7ff8a93035fb 59267->59269 59269->59266 59269->59270 59271 7ff8a9307634 59270->59271 59273 7ff8a9303768 memcpy 59270->59273 59747 7ff8a93099c0 49 API calls 59271->59747 59273->59271 59274 7ff8a9303786 59273->59274 59275 7ff8a93037ec 59274->59275 59276 7ff8a93037d9 HeapFree 59274->59276 59277 7ff8a934b740 2 API calls 59275->59277 59276->59275 59278 7ff8a930383c 59277->59278 59279 7ff8a9303845 59278->59279 59280 7ff8a930782d 59278->59280 59282 7ff8a934b740 2 API calls 59279->59282 59757 7ff8a9308d80 49 API calls 59280->59757 59283 7ff8a9303982 59282->59283 59284 7ff8a9307841 59283->59284 59285 7ff8a930398b 59283->59285 59758 7ff8a9308d80 49 API calls 59284->59758 59598 7ff8a9350290 59285->59598 59293 7ff8a9307855 59759 7ff8a930b610 49 API calls 59293->59759 59294 7ff8a9303a35 59296 7ff8a9301770 64 API calls 59294->59296 59297 7ff8a9303a84 59296->59297 59298 7ff8a9303a92 GetCurrentProcess OpenProcessToken 59297->59298 59299 7ff8a93042c1 59297->59299 59300 7ff8a9303bc7 59298->59300 59301 7ff8a9303ad3 GetTokenInformation CloseHandle 59298->59301 59302 7ff8a93042e5 59299->59302 59303 7ff8a93042cf HeapFree 59299->59303 59305 7ff8a9309320 50 API calls 59300->59305 59301->59300 59304 7ff8a9303b0c 59301->59304 59306 7ff8a9304306 59302->59306 59307 7ff8a93042f0 HeapFree 59302->59307 59303->59302 59304->59300 59308 7ff8a9303b17 59304->59308 59309 7ff8a9303bc2 59305->59309 59311 7ff8a930431e 59306->59311 59312 7ff8a930430b HeapFree 59306->59312 59307->59306 59310 7ff8a9309320 50 API calls 59308->59310 59316 7ff8a934b740 2 API calls 59309->59316 59310->59309 59313 7ff8a9304347 59311->59313 59314 7ff8a9304331 HeapFree 59311->59314 59312->59311 59315 7ff8a9304352 HeapFree 59313->59315 59496 7ff8a9304368 59313->59496 59314->59313 59315->59496 59317 7ff8a9303cd1 59316->59317 59318 7ff8a9307a6c 59317->59318 59319 7ff8a9303cda 59317->59319 59765 7ff8a9308d80 49 API calls 59318->59765 59323 7ff8a93501c0 52 API calls 59319->59323 59320 7ff8a9304393 HeapFree 59320->59496 59322 7ff8a9304389 HeapFree 59322->59496 59325 7ff8a9303dde 59323->59325 59324 7ff8a9304466 SetLastError 59324->59496 59326 7ff8a934a980 385 API calls 59325->59326 59327 7ff8a9303dfe 59326->59327 59329 7ff8a9307a80 59327->59329 59330 7ff8a9303e2f 59327->59330 59766 7ff8a930b610 49 API calls 59329->59766 59332 7ff8a9301770 64 API calls 59330->59332 59331 7ff8a9304482 GetLastError 59334 7ff8a93071b5 GetLastError 59331->59334 59331->59496 59347 7ff8a9303e7e 59332->59347 59337 7ff8a93071db 59334->59337 59338 7ff8a93071c8 HeapFree 59334->59338 59335 7ff8a930449b GetLastError 59336 7ff8a9307198 59335->59336 59335->59496 59738 7ff8a930a6d0 49 API calls 59336->59738 59739 7ff8a930b610 49 API calls 59337->59739 59338->59337 59339 7ff8a9304265 59342 7ff8a9304272 HeapFree 59339->59342 59343 7ff8a9304288 59339->59343 59340 7ff8a930788b 59760 7ff8a930a360 49 API calls 59340->59760 59342->59343 59348 7ff8a9304293 HeapFree 59343->59348 59349 7ff8a93042a9 59343->59349 59347->59339 59350 7ff8a934b740 2 API calls 59347->59350 59348->59349 59349->59299 59351 7ff8a93042ae HeapFree 59349->59351 59353 7ff8a9303edb 59350->59353 59351->59299 59352 7ff8a9304510 HeapFree 59352->59496 59354 7ff8a9303ee4 59353->59354 59355 7ff8a9307bb8 59353->59355 59358 7ff8a934b740 2 API calls 59354->59358 59773 7ff8a9308d80 49 API calls 59355->59773 59357 7ff8a93045d8 memcpy 59663 7ff8a933e310 59357->59663 59361 7ff8a9304017 59358->59361 59359 7ff8a9307ab9 59767 7ff8a9308da0 49 API calls 59359->59767 59363 7ff8a9307b05 59361->59363 59365 7ff8a9350290 50 API calls 59361->59365 59770 7ff8a9308d80 49 API calls 59363->59770 59364 7ff8a930464e HeapFree 59364->59496 59369 7ff8a9304063 59365->59369 59367 7ff8a9307ac3 59768 7ff8a9308d80 49 API calls 59367->59768 59368 7ff8a933ad60 72 API calls 59368->59496 59374 7ff8a934b740 2 API calls 59369->59374 59371 7ff8a93079fd 59371->59194 59771 7ff8a930b610 49 API calls 59371->59771 59372 7ff8a9307576 59743 7ff8a930b610 49 API calls 59372->59743 59377 7ff8a93040e8 59374->59377 59377->59363 59378 7ff8a93040f1 59377->59378 59379 7ff8a9304112 59378->59379 59381 7ff8a9350290 50 API calls 59378->59381 59382 7ff8a93501c0 52 API calls 59379->59382 59380 7ff8a9307568 CloseHandle 59380->59372 59381->59379 59384 7ff8a9304163 59382->59384 59383 7ff8a93075aa 59744 7ff8a9309a00 49 API calls 59383->59744 59386 7ff8a9304184 59384->59386 59387 7ff8a930416e HeapFree 59384->59387 59389 7ff8a934a980 385 API calls 59386->59389 59387->59386 59388 7ff8a93047b5 CloseHandle 59388->59496 59390 7ff8a930419b 59389->59390 59391 7ff8a93041d5 59390->59391 59392 7ff8a9307bcc 59390->59392 59393 7ff8a9301770 64 API calls 59391->59393 59774 7ff8a930b610 49 API calls 59392->59774 59395 7ff8a930421e 59393->59395 59400 7ff8a9304247 59395->59400 59401 7ff8a9304234 HeapFree 59395->59401 59395->59496 59396 7ff8a93078a5 59761 7ff8a930b610 49 API calls 59396->59761 59397 7ff8a9304822 SetFilePointerEx 59399 7ff8a93078d9 GetLastError 59397->59399 59397->59496 59420 7ff8a930713b 59399->59420 59400->59339 59403 7ff8a930424f HeapFree 59400->59403 59401->59400 59402 7ff8a9306b90 HeapFree 59402->59496 59403->59339 59404 7ff8a9306bab HeapFree 59404->59496 59405 7ff8a9307432 CloseHandle 59409 7ff8a930743c 59405->59409 59406 7ff8a93048c3 SetFilePointerEx 59408 7ff8a930712e GetLastError 59406->59408 59406->59496 59407 7ff8a9306bcc HeapFree 59407->59496 59408->59420 59740 7ff8a930b610 49 API calls 59409->59740 59411 7ff8a9306bed HeapFree 59411->59496 59412 7ff8a9306c08 HeapFree 59412->59496 59413 7ff8a9306c24 HeapFree 59413->59496 59414 7ff8a9306c45 HeapFree 59414->59496 59415 7ff8a930491a SetFilePointerEx 59415->59408 59415->59496 59416 7ff8a9306c60 HeapFree 59416->59496 59417 7ff8a9306c86 HeapFree 59417->59496 59419 7ff8a931bb00 51 API calls 59419->59496 59420->59405 59421 7ff8a9307925 59421->59420 59422 7ff8a930741c HeapFree 59421->59422 59422->59405 59423 7ff8a934b740 GetProcessHeap HeapAlloc 59423->59496 59425 7ff8a9307ad5 59769 7ff8a9308d80 49 API calls 59425->59769 59426 7ff8a9307955 59762 7ff8a930b610 49 API calls 59426->59762 59427 7ff8a9304bd9 SetFilePointerEx 59429 7ff8a9307986 GetLastError 59427->59429 59427->59496 59429->59409 59431 7ff8a9305c10 HeapFree 59431->59496 59432 7ff8a93079ae 59763 7ff8a93099c0 49 API calls 59432->59763 59434 7ff8a9305cd7 SetFilePointerEx 59435 7ff8a9307a0e GetLastError 59434->59435 59434->59496 59435->59371 59436 7ff8a9307368 59437 7ff8a9307378 HeapFree 59436->59437 59439 7ff8a93070f0 59436->59439 59437->59439 59438 7ff8a93073f0 59443 7ff8a9307411 59438->59443 59444 7ff8a93073fb HeapFree 59438->59444 59439->59438 59442 7ff8a93073c4 HeapFree 59439->59442 59445 7ff8a93073dd HeapFree 59439->59445 59440 7ff8a93070d1 59440->59436 59440->59439 59440->59440 59441 7ff8a9307506 HeapFree 59440->59441 59441->59440 59442->59439 59443->59405 59443->59422 59444->59443 59445->59439 59446 7ff8a931ba20 52 API calls 59446->59496 59447 7ff8a930724a 59447->59440 59448 7ff8a9307330 HeapFree 59447->59448 59448->59440 59449 7ff8a9307260 59449->59447 59450 7ff8a9307305 HeapFree 59449->59450 59450->59447 59451 7ff8a9352780 52 API calls 59451->59496 59452 7ff8a93090e0 53 API calls 59452->59496 59453 7ff8a9305344 SetFilePointerEx 59457 7ff8a9305370 SetFilePointerEx 59453->59457 59458 7ff8a930715d GetLastError 59453->59458 59454 7ff8a9307697 59749 7ff8a9308d80 49 API calls 59454->59749 59455 7ff8a930522b memcpy 59455->59496 59457->59458 59470 7ff8a93053a5 59457->59470 59459 7ff8a9307189 59458->59459 59460 7ff8a93072b7 59459->59460 59461 7ff8a93072a1 HeapFree 59459->59461 59464 7ff8a93072c2 HeapFree 59460->59464 59465 7ff8a9307076 59460->59465 59461->59460 59462 7ff8a931bb00 51 API calls 59462->59470 59463 7ff8a93076c6 59750 7ff8a9308d80 49 API calls 59463->59750 59464->59465 59465->59449 59468 7ff8a930709d HeapFree 59465->59468 59466 7ff8a9305305 memcpy 59466->59453 59468->59449 59469 7ff8a93053e5 SetFilePointerEx 59469->59458 59469->59470 59470->59459 59470->59462 59470->59469 59471 7ff8a93054e2 DosDateTimeToFileTime 59470->59471 59471->59458 59472 7ff8a9305515 FileTimeToSystemTime 59471->59472 59472->59458 59472->59496 59473 7ff8a9305780 SetFilePointerEx 59474 7ff8a930751a GetLastError 59473->59474 59473->59496 59474->59440 59475 7ff8a9306e36 59734 7ff8a9309a00 49 API calls 59475->59734 59476 7ff8a9305841 HeapFree 59476->59496 59477 7ff8a9305862 HeapFree 59477->59496 59479 7ff8a930701e 59735 7ff8a93533a0 50 API calls 59479->59735 59480 7ff8a9305888 HeapFree 59480->59496 59482 7ff8a9305966 memcpy 59482->59496 59483 7ff8a9305752 memcpy 59485 7ff8a9307043 59483->59485 59483->59496 59484 7ff8a930755e 59742 7ff8a9308da0 49 API calls 59484->59742 59736 7ff8a93533a0 50 API calls 59485->59736 59488 7ff8a9307041 59737 7ff8a931c480 HeapFree 59488->59737 59490 7ff8a930754c 59741 7ff8a9308d80 49 API calls 59490->59741 59493 7ff8a9305a5c memcmp 59493->59496 59494 7ff8a9305ae7 HeapFree 59494->59496 59495 7ff8a9304c90 memcpy 59495->59496 59496->59320 59496->59322 59496->59324 59496->59331 59496->59335 59496->59337 59496->59340 59496->59352 59496->59357 59496->59359 59496->59364 59496->59367 59496->59368 59496->59371 59496->59372 59496->59380 59496->59383 59496->59388 59496->59396 59496->59397 59496->59402 59496->59404 59496->59406 59496->59407 59496->59409 59496->59411 59496->59412 59496->59413 59496->59414 59496->59415 59496->59416 59496->59417 59496->59419 59496->59420 59496->59421 59496->59423 59496->59425 59496->59426 59496->59427 59496->59431 59496->59432 59496->59434 59496->59440 59496->59446 59496->59447 59496->59449 59496->59451 59496->59452 59496->59453 59496->59454 59496->59455 59496->59463 59496->59466 59496->59473 59496->59475 59496->59476 59496->59477 59496->59479 59496->59480 59496->59482 59496->59483 59496->59484 59496->59488 59496->59490 59496->59493 59496->59494 59496->59495 59645 7ff8a9320d40 59496->59645 59672 7ff8a931d410 59496->59672 59683 7ff8a933e2b0 SetFilePointerEx 59496->59683 59686 7ff8a931c360 59496->59686 59732 7ff8a93224f0 50 API calls 59496->59732 59733 7ff8a931afa0 52 API calls 59496->59733 59498 7ff8a930258f 59497->59498 59499 7ff8a933d360 59497->59499 59498->59141 59498->59142 59499->59498 59779 7ff8a930b610 49 API calls 59499->59779 59507 7ff8a930885c 59506->59507 59508 7ff8a9308860 59507->59508 59509 7ff8a9302a4b 59507->59509 59510 7ff8a9308875 GetModuleFileNameW 59508->59510 59509->59197 59509->59207 59509->59215 59510->59509 59511 7ff8a930888c 59510->59511 59512 7ff8a930889a 59511->59512 59513 7ff8a93089d7 59511->59513 59514 7ff8a9320d40 52 API calls 59512->59514 59780 7ff8a930a360 49 API calls 59513->59780 59517 7ff8a93088a9 59514->59517 59517->59509 59518 7ff8a93088bf 59517->59518 59519 7ff8a93089c4 HeapFree 59517->59519 59518->59509 59519->59509 59521 7ff8a93100c8 TlsGetValue 59520->59521 59522 7ff8a931018c 59520->59522 59523 7ff8a93100d9 59521->59523 59526 7ff8a9310185 59521->59526 59781 7ff8a931cb30 49 API calls 59522->59781 59525 7ff8a93100df BCryptGenRandom 59523->59525 59523->59526 59528 7ff8a931010b SystemFunction036 59525->59528 59531 7ff8a931012f 59525->59531 59526->59227 59527 7ff8a9310198 TlsGetValue 59527->59523 59527->59526 59529 7ff8a9310123 59528->59529 59528->59531 59530 7ff8a93103d2 59529->59530 59529->59531 59532 7ff8a934b740 2 API calls 59530->59532 59534 7ff8a934b740 2 API calls 59531->59534 59533 7ff8a93103e5 59532->59533 59784 7ff8a93099c0 49 API calls 59533->59784 59535 7ff8a931020c 59534->59535 59537 7ff8a934b740 2 API calls 59535->59537 59544 7ff8a93103af 59535->59544 59538 7ff8a9310300 59537->59538 59539 7ff8a9310309 59538->59539 59538->59544 59542 7ff8a9310324 TlsGetValue 59539->59542 59782 7ff8a931cb30 49 API calls 59539->59782 59540 7ff8a93104ba 59785 7ff8a9354020 6 API calls 59540->59785 59549 7ff8a9310338 TlsSetValue 59542->59549 59550 7ff8a9310392 59542->59550 59543 7ff8a93104a9 HeapFree 59543->59540 59544->59540 59544->59543 59545 7ff8a93104c2 59548 7ff8a93104e5 59545->59548 59551 7ff8a93104d4 HeapFree 59545->59551 59786 7ff8a9354020 6 API calls 59548->59786 59549->59526 59553 7ff8a9310347 59549->59553 59783 7ff8a931cb30 49 API calls 59550->59783 59551->59548 59554 7ff8a9310363 HeapFree 59553->59554 59556 7ff8a9310355 HeapFree 59553->59556 59554->59526 59555 7ff8a931039e TlsSetValue 59555->59526 59555->59553 59556->59554 59558 7ff8a93104fd 59559 7ff8a9310514 TlsSetValue 59558->59559 59787 7ff8a931cb30 49 API calls 59558->59787 59562 7ff8a9310548 HeapFree 59559->59562 59563 7ff8a9310534 59559->59563 59565 7ff8a9310560 TlsSetValue 59562->59565 59566 7ff8a9310564 59562->59566 59563->59562 59564 7ff8a931053a HeapFree 59563->59564 59564->59562 59565->59227 59788 7ff8a931cb30 49 API calls 59566->59788 59570 7ff8a931c8a6 59569->59570 59579 7ff8a931c8f9 59569->59579 59571 7ff8a931cabb 59570->59571 59572 7ff8a931c96d 59570->59572 59570->59579 59790 7ff8a9308d80 49 API calls 59571->59790 59574 7ff8a934b740 2 API calls 59572->59574 59576 7ff8a931c97e 59574->59576 59575 7ff8a931cac5 59791 7ff8a9308d80 49 API calls 59575->59791 59576->59575 59584 7ff8a931c987 59576->59584 59579->59241 59584->59579 59789 7ff8a9319e00 50 API calls 59584->59789 59590 7ff8a9321179 59588->59590 59589 7ff8a93034f7 59589->59260 59589->59263 59590->59589 59591 7ff8a9321314 59590->59591 59592 7ff8a9321302 59590->59592 59596 7ff8a9321293 59590->59596 59794 7ff8a930b6a0 49 API calls 59591->59794 59793 7ff8a930a360 49 API calls 59592->59793 59792 7ff8a9309a00 49 API calls 59596->59792 59599 7ff8a9350334 59598->59599 59600 7ff8a93502ae 59598->59600 59795 7ff8a9308d80 49 API calls 59599->59795 59603 7ff8a9322450 3 API calls 59600->59603 59602 7ff8a935031a 59606 7ff8a93039ab 59602->59606 59796 7ff8a9308d80 49 API calls 59602->59796 59603->59602 59607 7ff8a93501c0 59606->59607 59608 7ff8a93501da 59607->59608 59620 7ff8a93501f5 memcpy 59607->59620 59609 7ff8a93501dc 59608->59609 59610 7ff8a9350256 59608->59610 59615 7ff8a934b740 2 API calls 59609->59615 59797 7ff8a9308da0 49 API calls 59610->59797 59612 7ff8a9350217 59616 7ff8a9350290 50 API calls 59612->59616 59613 7ff8a93039fa 59626 7ff8a934a980 59613->59626 59618 7ff8a93501f0 59615->59618 59616->59613 59617 7ff8a935025b 59798 7ff8a9308d80 49 API calls 59617->59798 59618->59617 59618->59620 59620->59612 59620->59613 59627 7ff8a934a9c2 59626->59627 59799 7ff8a9340580 59626->59799 59629 7ff8a934a9da 59627->59629 59630 7ff8a9303a1d 59627->59630 59631 7ff8a934aa1c 59629->59631 59632 7ff8a934aa17 CloseHandle 59629->59632 59630->59293 59630->59294 60077 7ff8a934b170 12 API calls 59631->60077 59632->59631 59634 7ff8a934aa9c CloseHandle 59636 7ff8a934ae6d WaitForSingleObject 59634->59636 59638 7ff8a934ae87 GetLastError 59636->59638 59639 7ff8a934aeae 59638->59639 59640 7ff8a934ae99 HeapFree 59638->59640 59641 7ff8a934aebc HeapFree 59639->59641 59642 7ff8a934aed1 CloseHandle CloseHandle 59639->59642 59640->59639 59641->59642 59644 7ff8a934af3f 59642->59644 59644->59630 59646 7ff8a9320d67 59645->59646 59662 7ff8a9320d87 59645->59662 59647 7ff8a9320d6d 59646->59647 59648 7ff8a9320fd3 59646->59648 59649 7ff8a934b740 2 API calls 59647->59649 60297 7ff8a9308da0 49 API calls 59648->60297 59651 7ff8a9320d7e 59649->59651 59652 7ff8a9320fd8 59651->59652 59651->59662 60298 7ff8a9308d80 49 API calls 59652->60298 59654 7ff8a9320faf 59654->59496 59660 7ff8a9320dc0 memcpy 59660->59662 59662->59654 59662->59660 60296 7ff8a93223b0 50 API calls 59662->60296 59664 7ff8a933e348 59663->59664 59665 7ff8a933e374 59663->59665 60299 7ff8a9321330 49 API calls 59664->60299 60300 7ff8a9321010 49 API calls 59665->60300 59673 7ff8a931d461 59672->59673 59674 7ff8a931d468 WaitForSingleObject 59673->59674 59675 7ff8a931d47f 59673->59675 59674->59675 59676 7ff8a931d4ab 59674->59676 59677 7ff8a931d48b RtlNtStatusToDosError 59675->59677 59678 7ff8a931d483 59675->59678 60301 7ff8a931ccf0 49 API calls 59676->60301 59677->59678 59678->59496 59680 7ff8a931d4e5 60302 7ff8a931cda0 HeapFree 59680->60302 59682 7ff8a931d4f2 59684 7ff8a933e2ec GetLastError 59683->59684 59685 7ff8a933e2e0 59683->59685 59684->59496 59685->59496 59687 7ff8a931c38c 59686->59687 59688 7ff8a931c376 TlsGetValue 59686->59688 60303 7ff8a931cb30 49 API calls 59687->60303 59691 7ff8a931c383 59688->59691 59692 7ff8a931c3a5 59688->59692 59690 7ff8a931c398 TlsGetValue 59690->59691 59690->59692 59691->59496 59692->59691 59693 7ff8a934b740 2 API calls 59692->59693 59694 7ff8a931c3da 59693->59694 59695 7ff8a931c46d 59694->59695 59696 7ff8a931c401 TlsGetValue 59694->59696 60304 7ff8a931cb30 49 API calls 59694->60304 59699 7ff8a931c45d 59696->59699 59700 7ff8a931c415 TlsSetValue 59696->59700 60305 7ff8a931cb30 49 API calls 59699->60305 59700->59691 59703 7ff8a931c428 HeapFree 59700->59703 59703->59691 59704->59165 59705->59165 59709 7ff8a933d0d4 59706->59709 59707 7ff8a933d157 SetLastError GetModuleFileNameW 59707->59709 59710 7ff8a933d172 GetLastError 59707->59710 59709->59707 59712 7ff8a933d18b GetLastError 59709->59712 59714 7ff8a933d1bd 59709->59714 60306 7ff8a93224f0 50 API calls 59709->60306 59710->59709 59711 7ff8a933d225 GetLastError 59710->59711 59715 7ff8a933d1fb HeapFree 59711->59715 59716 7ff8a93023b0 59711->59716 59712->59709 59713 7ff8a933d256 59712->59713 60307 7ff8a930a6d0 49 API calls 59713->60307 59718 7ff8a933d270 59714->59718 59719 7ff8a933d1c6 59714->59719 59715->59716 59716->59129 59728 7ff8a931cdc0 HeapFree 59716->59728 60308 7ff8a930a360 49 API calls 59718->60308 59722 7ff8a9320d40 52 API calls 59719->59722 59723 7ff8a933d1d5 59722->59723 59723->59715 59723->59716 59728->59129 59729->59135 59730->59146 59731->59233 59732->59496 59733->59496 59735->59488 59736->59488 59737->59465 59752->59194 59753->59194 59775->59182 59776->59196 59777->59231 59778->59238 59781->59527 59782->59542 59783->59555 59785->59545 59786->59558 59787->59559 59788->59565 59789->59584 59800 7ff8a93405c6 59799->59800 59801 7ff8a9340603 GetEnvironmentStringsW 59800->59801 59827 7ff8a93405cb 59800->59827 59872 7ff8a93407e5 59800->59872 59802 7ff8a9343358 GetLastError 59801->59802 59869 7ff8a9340611 59801->59869 60164 7ff8a93099c0 49 API calls 59802->60164 59804 7ff8a934105c 59806 7ff8a934b740 2 API calls 59804->59806 59805 7ff8a93431b3 60153 7ff8a930b710 49 API calls 59805->60153 59809 7ff8a9341096 59806->59809 59838 7ff8a9343314 59809->59838 60125 7ff8a9343990 51 API calls 59809->60125 59811 7ff8a9341729 59811->59627 59812 7ff8a9341720 CloseHandle 59812->59811 59813 7ff8a93416a4 59980 7ff8a934171a 59813->59980 60128 7ff8a9346dc0 377 API calls 59813->60128 59816 7ff8a9342e3a 60152 7ff8a930b710 49 API calls 59816->60152 59821 7ff8a93432ae 60158 7ff8a9309a00 49 API calls 59821->60158 59823 7ff8a93411b7 HeapFree 59823->59827 59829 7ff8a93411fe HeapFree 59823->59829 59827->59813 59832 7ff8a934128f 59827->59832 59834 7ff8a934130b 59827->59834 59857 7ff8a9341446 59827->59857 59828 7ff8a93432c6 60159 7ff8a930a360 49 API calls 59828->60159 59829->59827 59831 7ff8a9343249 60155 7ff8a9308d80 49 API calls 59831->60155 59832->59627 59833 7ff8a9340aea memcpy 59833->59872 59834->59838 59846 7ff8a934b740 2 API calls 59834->59846 59835 7ff8a9341155 CompareStringOrdinal 59843 7ff8a93410d6 59835->59843 59837 7ff8a9320d40 52 API calls 59837->59869 60165 7ff8a9308d80 49 API calls 59838->60165 59842 7ff8a934326e 60156 7ff8a9308d80 49 API calls 59842->60156 59843->59823 59843->59835 59844 7ff8a93411ae 59843->59844 59848 7ff8a93415d8 59843->59848 59844->59823 59856 7ff8a93431c4 GetLastError 59844->59856 59845 7ff8a9340b5f memcpy 59845->59872 59855 7ff8a9341396 59846->59855 59847 7ff8a93432e0 60160 7ff8a9309a00 49 API calls 59847->60160 59848->59856 59853 7ff8a934b740 GetProcessHeap HeapAlloc 59853->59872 59855->59838 59860 7ff8a934139f memcpy 59855->59860 60154 7ff8a93099c0 49 API calls 59856->60154 59857->59813 59875 7ff8a9341a68 59857->59875 60130 7ff8a933cd90 59857->60130 59859 7ff8a934328e 60157 7ff8a9308d80 49 API calls 59859->60157 60126 7ff8a933d4a0 51 API calls 59860->60126 59863 7ff8a9340bcf memcpy 60124 7ff8a9343ba0 377 API calls 59863->60124 59864 7ff8a9344e00 76 API calls 59864->59872 59869->59821 59869->59828 59869->59837 59869->59847 59869->59872 59899 7ff8a93407cb HeapFree 59869->59899 60121 7ff8a9343990 51 API calls 59869->60121 60122 7ff8a9343ba0 377 API calls 59869->60122 59872->59804 59872->59805 59872->59816 59872->59831 59872->59833 59872->59842 59872->59845 59872->59853 59872->59859 59872->59863 59872->59864 59876 7ff8a9340c36 HeapFree 59872->59876 59883 7ff8a93432f7 59872->59883 59884 7ff8a9340f94 HeapFree 59872->59884 59891 7ff8a934100f HeapFree 59872->59891 59897 7ff8a9341022 HeapFree 59872->59897 59900 7ff8a9341044 HeapFree 59872->59900 60123 7ff8a9344ca0 51 API calls 59872->60123 59873 7ff8a93413da 59879 7ff8a9345950 98 API calls 59873->59879 59877 7ff8a933d070 59 API calls 59875->59877 59876->59872 59881 7ff8a9341a74 59877->59881 59885 7ff8a93413f8 59879->59885 59887 7ff8a9341a9b 59881->59887 59888 7ff8a9341a8a 59881->59888 60161 7ff8a930a6d0 49 API calls 59883->60161 59884->59872 59892 7ff8a9341522 59885->59892 60127 7ff8a933fc10 49 API calls 59885->60127 60078 7ff8a933f360 59887->60078 60136 7ff8a931cdc0 HeapFree 59888->60136 59891->59872 59902 7ff8a9341672 HeapFree 59892->59902 59937 7ff8a9341683 59892->59937 59897->59872 59899->59869 59900->59872 59901 7ff8a9341abe 59905 7ff8a933e310 49 API calls 59901->59905 59902->59937 59904 7ff8a933e310 49 API calls 59923 7ff8a9341a51 59904->59923 59909 7ff8a9341aee 59905->59909 59907 7ff8a9341efa HeapFree 59907->59923 59912 7ff8a9341b00 59909->59912 59917 7ff8a933fd20 51 API calls 59909->59917 59910 7ff8a933cd90 52 API calls 59910->59923 59918 7ff8a9345950 98 API calls 59912->59918 59913 7ff8a9341c27 SetLastError GetSystemDirectoryW 59921 7ff8a9341c3f GetLastError 59913->59921 59922 7ff8a9341a96 59913->59922 59914 7ff8a9341776 59920 7ff8a933b920 50 API calls 59914->59920 59916 7ff8a9345950 98 API calls 59916->59923 59917->59912 59925 7ff8a9341b17 59918->59925 59927 7ff8a93417b9 59920->59927 59921->59922 59928 7ff8a9341f20 GetLastError 59921->59928 59922->59913 59929 7ff8a9341c58 GetLastError 59922->59929 59935 7ff8a9341d35 59922->59935 59938 7ff8a9341f0d 59922->59938 60137 7ff8a93224f0 50 API calls 59922->60137 59923->59875 59923->59904 59923->59907 59923->59910 59923->59916 59931 7ff8a9341eba HeapFree 59923->59931 59923->59938 60139 7ff8a933fd20 51 API calls 59923->60139 59925->59922 59932 7ff8a9341b1e HeapFree 59925->59932 59936 7ff8a933b9c0 50 API calls 59927->59936 59933 7ff8a9341f52 HeapFree 59928->59933 59934 7ff8a9341df9 59928->59934 59929->59922 59930 7ff8a934331e 59929->59930 60162 7ff8a930a6d0 49 API calls 59930->60162 59931->59923 59932->59922 59933->59934 59956 7ff8a9341e24 59934->59956 59975 7ff8a934218a 59934->59975 60140 7ff8a931cdc0 HeapFree 59934->60140 59939 7ff8a9341d3e 59935->59939 59940 7ff8a93433f3 59935->59940 59942 7ff8a93417f5 59936->59942 59937->59813 59937->59914 59947 7ff8a934273a GetLastError 59937->59947 59937->59975 59993 7ff8a933cd90 52 API calls 59937->59993 60006 7ff8a9342914 59937->60006 60019 7ff8a9342857 HeapFree 59937->60019 60020 7ff8a933e310 49 API calls 59937->60020 60047 7ff8a9345950 98 API calls 59937->60047 60059 7ff8a93428b8 HeapFree 59937->60059 60062 7ff8a93428fa HeapFree 59937->60062 60088 7ff8a933bc20 59937->60088 60146 7ff8a931cdc0 HeapFree 59937->60146 60147 7ff8a933fd20 51 API calls 59937->60147 59938->59928 59943 7ff8a9320d40 52 API calls 59939->59943 60166 7ff8a930a360 49 API calls 59940->60166 59946 7ff8a933b920 50 API calls 59942->59946 59952 7ff8a9341811 59942->59952 59948 7ff8a9341d54 59943->59948 59946->59952 59947->59937 59950 7ff8a934276c HeapFree 59947->59950 59951 7ff8a933e310 49 API calls 59948->59951 59949 7ff8a93418b7 59960 7ff8a93418d4 59949->59960 59962 7ff8a9341913 59949->59962 59950->59937 59953 7ff8a9341d71 59951->59953 59952->59949 59957 7ff8a933b920 50 API calls 59952->59957 59970 7ff8a9341890 59952->59970 60129 7ff8a9346910 377 API calls 59952->60129 59961 7ff8a9341d86 59953->59961 60138 7ff8a933fd20 51 API calls 59953->60138 59954 7ff8a9342037 SetLastError GetWindowsDirectoryW 59955 7ff8a934204f GetLastError 59954->59955 59954->59956 59955->59947 59955->59956 59956->59954 59964 7ff8a9342068 GetLastError 59956->59964 59974 7ff8a934209a 59956->59974 60141 7ff8a93224f0 50 API calls 59956->60141 59957->59952 59960->59813 59972 7ff8a93418f4 HeapFree 59960->59972 60081 7ff8a9345950 59961->60081 59963 7ff8a9341967 59962->59963 59967 7ff8a933b920 50 API calls 59962->59967 59963->59975 59995 7ff8a9341c8a 59963->59995 60068 7ff8a93419f6 59963->60068 59964->59956 59969 7ff8a934333b 59964->59969 59967->59963 60163 7ff8a930a6d0 49 API calls 59969->60163 59970->59960 59979 7ff8a934189a HeapFree 59970->59979 59972->59813 59973 7ff8a9341da3 59981 7ff8a9341dbe 59973->59981 59982 7ff8a9341dad HeapFree 59973->59982 59977 7ff8a934340a 59974->59977 59978 7ff8a93420a3 59974->59978 59983 7ff8a933b920 50 API calls 59975->59983 60167 7ff8a930a360 49 API calls 59977->60167 59985 7ff8a9320d40 52 API calls 59978->59985 59979->59960 59980->59811 59980->59812 59981->59934 59987 7ff8a9341de4 HeapFree 59981->59987 59982->59981 59983->60068 59988 7ff8a93420b9 59985->59988 59987->59934 59991 7ff8a933e310 49 API calls 59988->59991 59996 7ff8a93420d6 59991->59996 59993->59937 59994 7ff8a9342c1f 60007 7ff8a9343144 HeapFree 59994->60007 60029 7ff8a934264e 59994->60029 59995->59994 60009 7ff8a9341cbc 59995->60009 60149 7ff8a9343990 51 API calls 59995->60149 59999 7ff8a93420eb 59996->59999 60142 7ff8a933fd20 51 API calls 59996->60142 59997 7ff8a9342c5e 60003 7ff8a933b920 50 API calls 59997->60003 59997->60009 59998 7ff8a9342ac7 60148 7ff8a9346dc0 377 API calls 59998->60148 60004 7ff8a9345950 98 API calls 59999->60004 60001 7ff8a93429f2 60013 7ff8a9343078 CloseHandle 60001->60013 60014 7ff8a9343084 60001->60014 60003->60009 60010 7ff8a9342108 60004->60010 60005 7ff8a9342ad2 60011 7ff8a9342ae9 60005->60011 60018 7ff8a933b920 50 API calls 60005->60018 60006->59813 60008 7ff8a9342919 HeapFree 60006->60008 60007->60029 60008->59813 60009->59994 60015 7ff8a9341cfe 60009->60015 60150 7ff8a9322590 WaitOnAddress GetLastError 60009->60150 60016 7ff8a9342123 60010->60016 60017 7ff8a9342112 HeapFree 60010->60017 60011->59995 60011->60009 60011->60029 60012 7ff8a9343163 HeapFree 60012->60029 60013->60014 60022 7ff8a934309a 60014->60022 60023 7ff8a934308e CloseHandle 60014->60023 60015->60001 60026 7ff8a9342a29 60015->60026 60037 7ff8a9342db8 60015->60037 60051 7ff8a9342cd6 60015->60051 60151 7ff8a93476d0 57 API calls 60015->60151 60016->59937 60028 7ff8a9342149 HeapFree 60016->60028 60017->60016 60018->60011 60019->59937 60020->59937 60021 7ff8a934317d HeapFree 60021->60029 60031 7ff8a93430a4 CloseHandle 60022->60031 60060 7ff8a93430b0 60022->60060 60023->60022 60024 7ff8a93425f6 60035 7ff8a93425fb HeapFree 60024->60035 60036 7ff8a9342609 60024->60036 60025 7ff8a9342e5c CreateProcessW 60032 7ff8a9342eab 60025->60032 60033 7ff8a9342fe4 GetLastError 60025->60033 60034 7ff8a934304a CloseHandle 60026->60034 60027 7ff8a93423b4 HeapFree 60027->60068 60028->59937 60029->59980 60029->60012 60029->60021 60065 7ff8a9342663 HeapFree 60029->60065 60145 7ff8a9346dc0 377 API calls 60029->60145 60031->60060 60038 7ff8a9342ee2 60032->60038 60039 7ff8a9342ef5 CloseHandle CloseHandle CloseHandle 60032->60039 60044 7ff8a9343008 60033->60044 60045 7ff8a9343036 CloseHandle 60033->60045 60034->60001 60048 7ff8a934305b CloseHandle 60034->60048 60035->60036 60042 7ff8a934261a HeapFree 60036->60042 60043 7ff8a9342628 60036->60043 60037->60025 60037->60044 60038->60039 60049 7ff8a9342f1a CloseHandle 60039->60049 60050 7ff8a9342f26 60039->60050 60041 7ff8a9342408 memcpy 60052 7ff8a9342436 HeapFree 60041->60052 60041->60068 60042->60043 60053 7ff8a9342639 HeapFree 60043->60053 60054 7ff8a9342647 60043->60054 60044->60045 60055 7ff8a9343042 CloseHandle 60045->60055 60047->59937 60048->60001 60049->60050 60063 7ff8a9342f58 60050->60063 60064 7ff8a9342f43 HeapFree 60050->60064 60051->60055 60052->60068 60053->60054 60054->60029 60055->60034 60056 7ff8a934310c WakeByAddressSingle 60057 7ff8a9343114 60056->60057 60057->59994 60061 7ff8a934311e HeapFree 60057->60061 60059->59937 60060->60056 60060->60057 60061->59994 60062->59937 60066 7ff8a9342f69 HeapFree 60063->60066 60067 7ff8a9342f7e 60063->60067 60064->60063 60065->60029 60066->60067 60069 7ff8a9342f88 HeapFree 60067->60069 60070 7ff8a9342f9d 60067->60070 60068->59998 60068->60024 60068->60027 60068->60029 60068->60041 60068->60043 60071 7ff8a933b9c0 50 API calls 60068->60071 60075 7ff8a93425a8 HeapFree 60068->60075 60076 7ff8a933b920 50 API calls 60068->60076 60143 7ff8a9340230 377 API calls 60068->60143 60144 7ff8a93224f0 50 API calls 60068->60144 60069->60070 60072 7ff8a9342fa2 HeapFree 60070->60072 60073 7ff8a9342fb7 60070->60073 60071->60068 60072->60073 60073->59980 60074 7ff8a9342fce HeapFree 60073->60074 60074->59980 60075->60068 60076->60068 60077->59634 60168 7ff8a9321330 49 API calls 60078->60168 60080 7ff8a933f387 60082 7ff8a933b0d0 52 API calls 60081->60082 60083 7ff8a9345977 60082->60083 60084 7ff8a9345984 60083->60084 60169 7ff8a9345870 60083->60169 60087 7ff8a93459bd 60084->60087 60278 7ff8a931cdc0 HeapFree 60084->60278 60087->59973 60089 7ff8a933b0d0 52 API calls 60088->60089 60090 7ff8a933bc51 60089->60090 60091 7ff8a933bc5a 60090->60091 60097 7ff8a933bc6b 60090->60097 60291 7ff8a931cdc0 HeapFree 60091->60291 60093 7ff8a933bc63 60093->59937 60094 7ff8a933bd48 SetLastError GetEnvironmentVariableW 60096 7ff8a933bd68 GetLastError 60094->60096 60094->60097 60096->60097 60098 7ff8a933be37 GetLastError 60096->60098 60097->60094 60099 7ff8a933bd81 GetLastError 60097->60099 60101 7ff8a933bdb3 60097->60101 60292 7ff8a93224f0 50 API calls 60097->60292 60102 7ff8a933be66 HeapFree 60098->60102 60106 7ff8a933be17 60098->60106 60099->60097 60100 7ff8a933bec5 60099->60100 60294 7ff8a930a6d0 49 API calls 60100->60294 60104 7ff8a933bedf 60101->60104 60105 7ff8a933bdbc 60101->60105 60102->60106 60295 7ff8a930a360 49 API calls 60104->60295 60109 7ff8a9320d40 52 API calls 60105->60109 60111 7ff8a933be20 60106->60111 60293 7ff8a931cdc0 HeapFree 60106->60293 60112 7ff8a933bdcb 60109->60112 60111->60093 60113 7ff8a933be9b HeapFree 60111->60113 60112->60106 60114 7ff8a933be02 HeapFree 60112->60114 60113->60093 60114->60106 60121->59869 60122->59869 60123->59872 60124->59872 60125->59843 60126->59873 60128->59980 60129->59952 60131 7ff8a933cdec 60130->60131 60132 7ff8a933cf4d 60131->60132 60135 7ff8a933b920 50 API calls 60131->60135 60133 7ff8a9320d40 52 API calls 60132->60133 60134 7ff8a933cfc0 60132->60134 60133->60132 60134->59923 60135->60131 60136->59922 60137->59922 60138->59961 60139->59923 60140->59956 60141->59956 60142->59999 60143->60068 60144->60068 60145->60029 60146->59937 60147->59937 60148->60005 60149->59997 60150->60015 60151->60037 60168->60080 60170 7ff8a9345889 60169->60170 60174 7ff8a934589e 60169->60174 60170->60084 60171 7ff8a93458c1 60172 7ff8a933b270 62 API calls 60171->60172 60173 7ff8a93458dd 60172->60173 60173->60084 60174->60171 60175 7ff8a9345907 60174->60175 60179 7ff8a93458f9 60174->60179 60175->60171 60200 7ff8a9345937 60175->60200 60176 7ff8a9349178 SetLastError GetFullPathNameW 60178 7ff8a934919a GetLastError 60176->60178 60176->60179 60178->60179 60180 7ff8a9349269 GetLastError 60178->60180 60179->60176 60181 7ff8a93491b3 GetLastError 60179->60181 60183 7ff8a93491e5 60179->60183 60279 7ff8a93224f0 50 API calls 60179->60279 60184 7ff8a9349298 HeapFree 60180->60184 60203 7ff8a934923e 60180->60203 60181->60179 60182 7ff8a934937e 60181->60182 60281 7ff8a930a6d0 49 API calls 60182->60281 60185 7ff8a93491ee 60183->60185 60186 7ff8a9349398 60183->60186 60184->60203 60191 7ff8a934920e 60185->60191 60192 7ff8a93493af 60185->60192 60282 7ff8a930a360 49 API calls 60186->60282 60188 7ff8a93492cc 60188->60084 60190 7ff8a9349578 SetLastError GetFullPathNameW 60196 7ff8a934959a GetLastError 60190->60196 60190->60200 60198 7ff8a9349217 60191->60198 60199 7ff8a93493c2 60191->60199 60283 7ff8a930b6a0 49 API calls 60192->60283 60195 7ff8a93492be HeapFree 60195->60188 60196->60200 60201 7ff8a9349670 GetLastError 60196->60201 60198->60203 60204 7ff8a9349220 memcmp 60198->60204 60284 7ff8a930a360 49 API calls 60199->60284 60200->60190 60202 7ff8a93495b3 GetLastError 60200->60202 60208 7ff8a93495e5 60200->60208 60285 7ff8a93224f0 50 API calls 60200->60285 60211 7ff8a934969f HeapFree 60201->60211 60236 7ff8a9349645 60201->60236 60202->60200 60209 7ff8a9349792 60202->60209 60203->60188 60203->60195 60204->60203 60210 7ff8a93492e1 60204->60210 60215 7ff8a93497ac 60208->60215 60216 7ff8a93495ee 60208->60216 60287 7ff8a930a6d0 49 API calls 60209->60287 60214 7ff8a9349310 60210->60214 60222 7ff8a934b740 2 API calls 60210->60222 60211->60236 60225 7ff8a9349315 memcpy 60214->60225 60288 7ff8a930a360 49 API calls 60215->60288 60223 7ff8a934960e 60216->60223 60224 7ff8a93497c3 60216->60224 60217 7ff8a93496d3 60217->60084 60227 7ff8a93492f6 60222->60227 60229 7ff8a93497d6 60223->60229 60230 7ff8a9349617 60223->60230 60289 7ff8a930b6a0 49 API calls 60224->60289 60231 7ff8a933b920 50 API calls 60225->60231 60226 7ff8a93496c5 HeapFree 60226->60217 60227->60225 60234 7ff8a93492fe 60227->60234 60290 7ff8a930a360 49 API calls 60229->60290 60235 7ff8a9349624 memcmp 60230->60235 60230->60236 60240 7ff8a9349344 60231->60240 60280 7ff8a9308d80 49 API calls 60234->60280 60235->60236 60243 7ff8a93496e8 60235->60243 60236->60217 60236->60226 60240->60203 60246 7ff8a9349368 HeapFree 60240->60246 60247 7ff8a9349717 60243->60247 60248 7ff8a934b740 2 API calls 60243->60248 60246->60203 60249 7ff8a934971c memcpy 60247->60249 60252 7ff8a93496fd 60248->60252 60253 7ff8a933b920 50 API calls 60249->60253 60252->60249 60256 7ff8a9349705 60252->60256 60257 7ff8a9349752 60253->60257 60286 7ff8a9308d80 49 API calls 60256->60286 60257->60236 60260 7ff8a9349776 HeapFree 60257->60260 60260->60236 60278->60087 60279->60179 60285->60200 60291->60093 60292->60097 60293->60111 60296->59662 60299->59665 60301->59680 60302->59682 60303->59690 60304->59696 60305->59700 60306->59709 58551 7ff8a9346f41 58554 7ff8a933ad60 58551->58554 58571 7ff8a933b0d0 58554->58571 58557 7ff8a933adcb 58559 7ff8a933ae09 58559->58557 58560 7ff8a933af80 HeapFree 58559->58560 58560->58557 58561 7ff8a933aeb2 CreateFileW 58563 7ff8a933af59 GetLastError 58561->58563 58564 7ff8a933aef3 58561->58564 58563->58557 58563->58559 58565 7ff8a933af36 58564->58565 58566 7ff8a933af04 GetLastError 58564->58566 58565->58557 58567 7ff8a933af3e HeapFree 58565->58567 58566->58565 58568 7ff8a933af13 SetFileInformationByHandle 58566->58568 58567->58557 58568->58565 58569 7ff8a933af9e GetLastError CloseHandle 58568->58569 58569->58557 58570 7ff8a933afbf 58569->58570 58570->58560 58572 7ff8a933b122 58571->58572 58573 7ff8a933b0f7 58571->58573 58635 7ff8a933b9c0 58572->58635 58575 7ff8a933b238 58573->58575 58576 7ff8a933b104 58573->58576 58655 7ff8a9308da0 49 API calls 58575->58655 58639 7ff8a934b740 58576->58639 58579 7ff8a933b119 58579->58572 58580 7ff8a933b23d 58579->58580 58656 7ff8a9308d80 49 API calls 58580->58656 58582 7ff8a933b1ff 58586 7ff8a933ad91 58582->58586 58646 7ff8a933b920 58582->58646 58584 7ff8a933b1d0 58584->58586 58587 7ff8a933b1ef HeapFree 58584->58587 58586->58557 58593 7ff8a933b270 58586->58593 58587->58586 58598 7ff8a933b299 58593->58598 58594 7ff8a933adbe 58594->58557 58594->58559 58594->58561 58595 7ff8a933b433 SetLastError GetFullPathNameW 58597 7ff8a933b45c GetLastError 58595->58597 58595->58598 58597->58598 58599 7ff8a933b502 GetLastError 58597->58599 58598->58594 58598->58595 58600 7ff8a933b475 GetLastError 58598->58600 58602 7ff8a933b4ad 58598->58602 58666 7ff8a93224f0 50 API calls 58598->58666 58603 7ff8a933b51b HeapFree 58599->58603 58604 7ff8a933b530 58599->58604 58600->58598 58601 7ff8a933b87e 58600->58601 58668 7ff8a930a6d0 49 API calls 58601->58668 58605 7ff8a933b898 58602->58605 58606 7ff8a933b4b6 58602->58606 58603->58604 58604->58594 58608 7ff8a933b559 HeapFree 58604->58608 58669 7ff8a930a360 49 API calls 58605->58669 58613 7ff8a933b64e 58606->58613 58627 7ff8a933b4d9 58606->58627 58608->58594 58620 7ff8a9322450 3 API calls 58613->58620 58631 7ff8a933b65b 58613->58631 58615 7ff8a933b742 memcpy 58621 7ff8a933b774 58615->58621 58622 7ff8a933b76c 58615->58622 58618 7ff8a933b602 memcpy 58618->58615 58618->58631 58619 7ff8a933b66d 58619->58615 58625 7ff8a933b837 58620->58625 58621->58594 58629 7ff8a933b797 HeapFree 58621->58629 58626 7ff8a933b920 50 API calls 58622->58626 58630 7ff8a933b8af 58625->58630 58625->58631 58626->58621 58627->58618 58632 7ff8a9322450 3 API calls 58627->58632 58629->58594 58670 7ff8a9308d80 49 API calls 58630->58670 58631->58619 58667 7ff8a93224f0 50 API calls 58631->58667 58633 7ff8a933b6ee 58632->58633 58633->58618 58633->58630 58637 7ff8a933b9e9 58635->58637 58636 7ff8a933b150 58636->58582 58636->58584 58637->58636 58657 7ff8a93224f0 50 API calls 58637->58657 58640 7ff8a934b75b GetProcessHeap 58639->58640 58644 7ff8a934b755 HeapAlloc 58639->58644 58640->58644 58645 7ff8a934b7a6 58640->58645 58643 7ff8a9399740 58644->58579 58644->58643 58645->58579 58647 7ff8a933b9a9 58646->58647 58648 7ff8a933b937 58646->58648 58664 7ff8a9308d80 49 API calls 58647->58664 58658 7ff8a9322450 58648->58658 58654 7ff8a933b996 58654->58586 58657->58636 58659 7ff8a9322465 58658->58659 58661 7ff8a9322492 58658->58661 58660 7ff8a9322479 HeapReAlloc 58659->58660 58662 7ff8a932249e 58659->58662 58660->58661 58661->58654 58665 7ff8a9308d80 49 API calls 58661->58665 58662->58661 58663 7ff8a934b740 2 API calls 58662->58663 58663->58661 58666->58598 58667->58619 59017 7ff8a934b250 59018 7ff8a934b2a1 59017->59018 59019 7ff8a934b269 59017->59019 59020 7ff8a934b377 CloseHandle CloseHandle 59018->59020 59026 7ff8a934b740 2 API calls 59018->59026 59028 7ff8a934b3bb 59018->59028 59036 7ff8a931cdc0 HeapFree 59018->59036 59021 7ff8a934b2b6 GetLastError 59019->59021 59022 7ff8a934b279 59019->59022 59020->59018 59034 7ff8a931cdc0 HeapFree 59021->59034 59022->59018 59025 7ff8a934b321 GetLastError 59022->59025 59027 7ff8a934b34e 59025->59027 59026->59018 59027->59018 59035 7ff8a931cdc0 HeapFree 59027->59035 59030 7ff8a934b3ee CloseHandle CloseHandle HeapFree 59028->59030 59031 7ff8a934b3d4 HeapFree 59028->59031 59037 7ff8a9354020 6 API calls 59030->59037 59031->59030 59033 7ff8a934b419 59034->59018 59035->59018 59036->59018 59037->59033 59042 7ff8a934b420 59043 7ff8a934b58e 59042->59043 59044 7ff8a934b43a 59042->59044 59060 7ff8a934b5b0 49 API calls 59043->59060 59046 7ff8a934b45b 59044->59046 59058 7ff8a93223b0 50 API calls 59044->59058 59048 7ff8a934b46a ReadFile 59046->59048 59049 7ff8a934b571 59046->59049 59047 7ff8a934b5a2 59050 7ff8a934b4bb GetLastError 59048->59050 59054 7ff8a934b4a1 59048->59054 59059 7ff8a93223b0 50 API calls 59049->59059 59055 7ff8a934b4e8 59050->59055 59053 7ff8a934b582 59055->59054 59057 7ff8a931cdc0 HeapFree 59055->59057 59057->59054 59058->59046 59059->59053 59060->59047 59061 7ff8a9346fa5 59066 7ff8a9347c00 59061->59066 59064 7ff8a9346fc5 59065 7ff8a93470fb CloseHandle 59065->59064 59067 7ff8a9347c60 GetCurrentProcessId 59066->59067 59085 7ff8a9347c74 59067->59085 59068 7ff8a9347c80 ProcessPrng 59068->59068 59068->59085 59070 7ff8a9347d27 HeapFree 59070->59085 59071 7ff8a934b740 2 API calls 59071->59085 59072 7ff8a93482e8 59121 7ff8a9308d80 49 API calls 59072->59121 59081 7ff8a93482d1 59120 7ff8a9308d80 49 API calls 59081->59120 59082 7ff8a93480c9 GetLastError 59082->59085 59086 7ff8a9348183 59082->59086 59083 7ff8a93481f6 59087 7ff8a934820c 59083->59087 59088 7ff8a93481fb HeapFree 59083->59088 59085->59067 59085->59068 59085->59070 59085->59071 59085->59072 59085->59081 59085->59082 59085->59083 59085->59086 59091 7ff8a9322450 3 API calls 59085->59091 59103 7ff8a9348124 HeapFree 59085->59103 59104 7ff8a9309320 59085->59104 59119 7ff8a931cdc0 HeapFree 59085->59119 59093 7ff8a934819e HeapFree 59086->59093 59094 7ff8a93481af 59086->59094 59092 7ff8a933ad60 72 API calls 59087->59092 59088->59087 59091->59085 59095 7ff8a9348269 59092->59095 59093->59094 59096 7ff8a93481cd 59094->59096 59097 7ff8a93481bf HeapFree 59094->59097 59095->59094 59101 7ff8a9348299 59095->59101 59098 7ff8a9346fb6 59096->59098 59099 7ff8a93481d3 CloseHandle 59096->59099 59097->59096 59098->59064 59098->59065 59099->59098 59101->59098 59102 7ff8a93482be HeapFree 59101->59102 59102->59098 59103->59067 59105 7ff8a9309340 59104->59105 59106 7ff8a930940d 59104->59106 59105->59106 59109 7ff8a930947b 59105->59109 59111 7ff8a934b740 2 API calls 59105->59111 59107 7ff8a930943b 59106->59107 59123 7ff8a930b610 49 API calls 59106->59123 59107->59085 59124 7ff8a9308da0 49 API calls 59109->59124 59113 7ff8a93093fb 59111->59113 59113->59106 59122 7ff8a9308d80 49 API calls 59113->59122 59119->59085 58671 26e0061 58672 26e007f 58671->58672 58675 26ee045 58672->58675 58674 26e0081 58676 26ee04f 58675->58676 58681 26f14ca 58675->58681 58677 26ee14e 58676->58677 58678 26ee080 58676->58678 58689 26ef41c 58677->58689 58713 26f0ec4 58678->58713 58681->58674 58683 26f0ec4 LoadLibraryA 58684 26ee0c8 58683->58684 58685 26f0ec4 LoadLibraryA 58684->58685 58686 26ee0de 58685->58686 58687 26f0ec4 LoadLibraryA 58686->58687 58688 26ee0f4 58687->58688 58688->58674 58690 26f0ec4 LoadLibraryA 58689->58690 58691 26ef445 58690->58691 58692 26f0ec4 LoadLibraryA 58691->58692 58693 26ef458 58692->58693 58694 26f0ec4 LoadLibraryA 58693->58694 58695 26ef46e 58694->58695 58696 26ef480 VirtualAlloc 58695->58696 58699 26ef499 58695->58699 58698 26ef4c5 58696->58698 58696->58699 58697 26f0ec4 LoadLibraryA 58702 26ef539 58697->58702 58698->58697 58698->58699 58699->58688 58700 26f0ec4 LoadLibraryA 58701 26ef590 58700->58701 58701->58699 58701->58700 58704 26ef5d0 58701->58704 58702->58699 58702->58701 58717 26f0c34 58702->58717 58704->58699 58710 26ef647 58704->58710 58726 26ee384 LoadLibraryA 58704->58726 58706 26ef769 58728 26efc28 LoadLibraryA 58706->58728 58707 26ef719 58707->58699 58721 26ef1a8 58707->58721 58708 26ef62e 58708->58699 58727 26ee4b0 LoadLibraryA 58708->58727 58710->58699 58710->58706 58710->58707 58714 26f0efb 58713->58714 58715 26ee090 58714->58715 58729 26ee9d0 LoadLibraryA 58714->58729 58715->58683 58715->58688 58719 26f0c52 58717->58719 58718 26f0cfd LoadLibraryA 58720 26f0d05 58718->58720 58719->58718 58719->58720 58720->58702 58722 26ef1e5 CLRCreateInstance 58721->58722 58724 26ef1fe 58721->58724 58722->58724 58723 26ef2ad 58723->58699 58724->58723 58725 26ef35d SafeArrayCreate 58724->58725 58725->58723 58726->58708 58727->58710 58728->58699 58729->58714 58730 7ff8a9305de8 58731 7ff8a934b740 2 API calls 58730->58731 58732 7ff8a9305dfc 58731->58732 58766 7ff8a930778c 58732->58766 58869 7ff8a9367fe0 58732->58869 58738 7ff8a9307edc 58920 7ff8a9301770 58738->58920 58739 7ff8a9307100 58911 7ff8a930b610 49 API calls 58739->58911 58740 7ff8a9306204 memset 58754 7ff8a93060e8 58740->58754 58741 7ff8a931a380 55 API calls 58741->58754 58743 7ff8a930638a 58885 7ff8a93015b0 58743->58885 58745 7ff8a9307ee9 58939 7ff8a9301660 HeapFree 58745->58939 58747 7ff8a9307129 HeapFree 58747->58738 58749 7ff8a930639c 58753 7ff8a933b0d0 52 API calls 58749->58753 58751 7ff8a9307f20 58757 7ff8a930814a 58751->58757 58758 7ff8a9307ffa HeapFree 58751->58758 58752 7ff8a930776f 58912 7ff8a930a6d0 49 API calls 58752->58912 58756 7ff8a93063b6 58753->58756 58754->58739 58754->58740 58754->58741 58754->58743 58754->58752 58909 7ff8a9319cd0 HeapReAlloc GetProcessHeap HeapAlloc 58754->58909 58759 7ff8a9306427 58756->58759 58761 7ff8a933b270 62 API calls 58756->58761 58940 7ff8a9301660 HeapFree 58757->58940 58758->58757 58762 7ff8a9306433 58759->58762 58763 7ff8a9307a22 58759->58763 58770 7ff8a9306404 58761->58770 58762->58766 58769 7ff8a934b740 2 API calls 58762->58769 58803 7ff8a9306468 HeapCreate HeapAlloc GetLastError 58762->58803 58913 7ff8a930b610 49 API calls 58763->58913 58764 7ff8a9308157 58768 7ff8a9308204 58764->58768 58771 7ff8a93081ff HeapFree 58764->58771 58914 7ff8a9308d80 49 API calls 58766->58914 58772 7ff8a930820f HeapFree 58768->58772 58773 7ff8a9308225 58768->58773 58776 7ff8a930645f 58769->58776 58770->58759 58777 7ff8a9306b3b 58770->58777 58778 7ff8a9306b5a GetLastError 58770->58778 58771->58768 58772->58773 58781 7ff8a9308230 HeapFree 58773->58781 58782 7ff8a9308246 58773->58782 58774 7ff8a9306573 memset 58783 7ff8a93065a8 58774->58783 58795 7ff8a930675c 58774->58795 58775 7ff8a9306eb2 58779 7ff8a9306ece 58775->58779 58780 7ff8a9306ebd HeapFree 58775->58780 58776->58766 58776->58803 58777->58762 58786 7ff8a9306b44 HeapFree 58777->58786 58778->58759 58789 7ff8a9306b72 HeapFree 58778->58789 58787 7ff8a9306eef 58779->58787 58788 7ff8a9306ed9 HeapFree 58779->58788 58780->58779 58781->58782 58784 7ff8a930824f 58782->58784 58790 7ff8a930845b HeapFree 58782->58790 58893 7ff8a9308f90 58783->58893 58797 7ff8a930859b HeapFree 58784->58797 58798 7ff8a93087de 58784->58798 58785 7ff8a9306911 AddVectoredExceptionHandler NtQueryInformationProcess 58791 7ff8a934b740 2 API calls 58785->58791 58786->58762 58910 7ff8a9301930 CloseHandle HeapFree HeapFree HeapFree HeapFree 58787->58910 58788->58787 58789->58759 58790->58784 58794 7ff8a9306979 58791->58794 58800 7ff8a9306982 NtQuerySystemInformation 58794->58800 58801 7ff8a9307c0b 58794->58801 58795->58785 58802 7ff8a9308f90 51 API calls 58795->58802 58796 7ff8a9306efc 58804 7ff8a9306f07 HeapFree 58796->58804 58805 7ff8a9306f1d 58796->58805 58797->58798 58809 7ff8a93087ee HeapFree 58798->58809 58810 7ff8a93087ff 58798->58810 58808 7ff8a9306de2 58800->58808 58865 7ff8a93069b8 58800->58865 58915 7ff8a9308d80 49 API calls 58801->58915 58811 7ff8a93067cd 58802->58811 58803->58774 58803->58775 58804->58805 58813 7ff8a9306f3e 58805->58813 58814 7ff8a9306f2d HeapFree 58805->58814 58806 7ff8a9307c27 58916 7ff8a930b610 49 API calls 58806->58916 58807 7ff8a9306617 GetModuleHandleA 58816 7ff8a9306637 LoadLibraryA 58807->58816 58817 7ff8a930664b 58807->58817 58815 7ff8a9306e89 HeapFree 58808->58815 58823 7ff8a9306def memcpy 58808->58823 58809->58810 58941 7ff8a93019f0 HeapFree 58810->58941 58818 7ff8a93067e5 GetModuleHandleA 58811->58818 58819 7ff8a9307cbb 58811->58819 58822 7ff8a9306f84 58813->58822 58827 7ff8a9306f71 HeapFree 58813->58827 58814->58813 58815->58823 58816->58808 58816->58817 58833 7ff8a9308f90 51 API calls 58817->58833 58825 7ff8a9306827 58818->58825 58918 7ff8a930b610 49 API calls 58819->58918 58829 7ff8a9306fa5 58822->58829 58830 7ff8a9306f8f HeapFree 58822->58830 58823->58775 58834 7ff8a9308f90 51 API calls 58825->58834 58826 7ff8a930880c 58942 7ff8a9354020 6 API calls 58826->58942 58827->58813 58830->58829 58832 7ff8a9306a6b 58838 7ff8a9306cd2 HeapFree 58832->58838 58839 7ff8a9306e5e 58832->58839 58836 7ff8a93066d0 58833->58836 58837 7ff8a9306885 58834->58837 58835 7ff8a9308814 58842 7ff8a9307c71 58836->58842 58843 7ff8a93066e8 GetProcAddress 58836->58843 58844 7ff8a9307d02 58837->58844 58845 7ff8a930689d GetProcAddress 58837->58845 58862 7ff8a9306d0c 58838->58862 58839->58808 58841 7ff8a9306e70 HeapFree 58839->58841 58840 7ff8a9306ab0 NtOpenThread 58840->58865 58841->58808 58917 7ff8a930b610 49 API calls 58842->58917 58848 7ff8a9306dc2 58843->58848 58849 7ff8a930670c 58843->58849 58844->58747 58919 7ff8a930b610 49 API calls 58844->58919 58850 7ff8a9306df4 58845->58850 58851 7ff8a93068c1 58845->58851 58848->58808 58854 7ff8a9306dd1 HeapFree 58848->58854 58858 7ff8a9306735 58849->58858 58859 7ff8a9306724 HeapFree 58849->58859 58855 7ff8a9306e0f 58850->58855 58856 7ff8a9306dfe HeapFree 58850->58856 58860 7ff8a93068ea 58851->58860 58861 7ff8a93068d9 HeapFree 58851->58861 58852 7ff8a9306d15 NtGetContextThread 58852->58808 58852->58862 58853 7ff8a9306feb 58853->58823 58857 7ff8a9306ff3 HeapFree 58853->58857 58854->58808 58855->58815 58863 7ff8a9306e1d 58855->58863 58856->58855 58857->58823 58858->58795 58864 7ff8a930674b HeapFree 58858->58864 58859->58858 58860->58785 58866 7ff8a9306900 HeapFree 58860->58866 58861->58860 58862->58852 58862->58853 58867 7ff8a9306da2 NtSetContextThread 58862->58867 58863->58823 58864->58795 58865->58808 58865->58832 58865->58840 58866->58785 58867->58808 58868 7ff8a9306db1 NtClose 58867->58868 58868->58862 58870 7ff8a9305e57 58869->58870 58871 7ff8a9367ff4 58869->58871 58870->58754 58873 7ff8a931a380 58870->58873 58871->58870 58872 7ff8a9368037 malloc 58871->58872 58872->58870 58874 7ff8a931a3ca 58873->58874 58875 7ff8a931a41e 58874->58875 58880 7ff8a931a41c 58874->58880 58943 7ff8a9352430 58874->58943 58959 7ff8a9352560 58874->58959 58979 7ff8a9350b10 HeapFree 58874->58979 58876 7ff8a931a47c 58875->58876 58877 7ff8a931a424 58875->58877 58980 7ff8a930a360 49 API calls 58876->58980 58878 7ff8a931a439 memcpy 58877->58878 58878->58880 58880->58754 58886 7ff8a93015f4 58885->58886 58887 7ff8a93015be 58885->58887 58886->58749 58888 7ff8a93015c3 58887->58888 58889 7ff8a93015fc 58887->58889 58890 7ff8a93015ca HeapFree 58888->58890 58892 7ff8a93015e5 58888->58892 58891 7ff8a9301603 HeapFree 58889->58891 58889->58892 58890->58892 58891->58892 58892->58749 58894 7ff8a934b740 2 API calls 58893->58894 58895 7ff8a9308fbf 58894->58895 58896 7ff8a9308fc4 memcpy 58895->58896 58897 7ff8a9309027 58895->58897 58899 7ff8a93065ff 58896->58899 58993 7ff8a9308d80 49 API calls 58897->58993 58899->58806 58899->58807 58909->58754 58910->58796 58921 7ff8a9301792 58920->58921 58922 7ff8a9301780 HeapFree 58920->58922 58923 7ff8a93017c4 58921->58923 58924 7ff8a93017b1 HeapFree 58921->58924 58922->58921 58925 7ff8a93017dd 58923->58925 58926 7ff8a93017cb HeapFree 58923->58926 58924->58921 58994 7ff8a931aa00 58925->58994 58926->58925 58929 7ff8a9301813 58931 7ff8a9301829 58929->58931 58933 7ff8a9301820 CloseHandle 58929->58933 58930 7ff8a9301801 HeapFree 58930->58929 58932 7ff8a930183f 58931->58932 58934 7ff8a9301836 CloseHandle 58931->58934 58935 7ff8a930184c CloseHandle 58932->58935 58938 7ff8a9301858 58932->58938 58933->58931 58934->58932 58935->58938 58936 7ff8a931a56d 58936->58745 58937 7ff8a931a510 HeapFree 58937->58938 58938->58936 58938->58937 58939->58751 58940->58764 58941->58826 58942->58835 58949 7ff8a9352460 58943->58949 58944 7ff8a93526c4 58983 7ff8a930b6a0 49 API calls 58944->58983 58945 7ff8a93524e0 58981 7ff8a9367960 memcpy memcpy memcpy 58945->58981 58946 7ff8a93524c1 58982 7ff8a930a360 49 API calls 58946->58982 58949->58944 58949->58945 58949->58946 58953 7ff8a9352550 58949->58953 58954 7ff8a935272c 58949->58954 58950 7ff8a935251a 58950->58953 58984 7ff8a93099c0 49 API calls 58950->58984 58953->58874 58985 7ff8a93099c0 49 API calls 58954->58985 58960 7ff8a9352589 58959->58960 58961 7ff8a935257b 58959->58961 58962 7ff8a93525f0 58960->58962 58964 7ff8a9352591 58960->58964 58961->58960 58976 7ff8a9352460 58961->58976 58966 7ff8a9352550 58962->58966 58992 7ff8a930a360 49 API calls 58962->58992 58964->58966 58987 7ff8a93533a0 50 API calls 58964->58987 58965 7ff8a93526c4 58989 7ff8a930b6a0 49 API calls 58965->58989 58966->58874 58969 7ff8a93524e0 58986 7ff8a9367960 memcpy memcpy memcpy 58969->58986 58970 7ff8a93524c1 58988 7ff8a930a360 49 API calls 58970->58988 58973 7ff8a935251a 58973->58966 58990 7ff8a93099c0 49 API calls 58973->58990 58976->58965 58976->58966 58976->58969 58976->58970 58977 7ff8a935272c 58976->58977 58991 7ff8a93099c0 49 API calls 58977->58991 58979->58874 58981->58950 58986->58973 58987->58966 58995 7ff8a931aa18 58994->58995 58997 7ff8a93017e9 58995->58997 58998 7ff8a931aab7 HeapFree 58995->58998 58999 7ff8a931aad2 HeapFree 58995->58999 59000 7ff8a931aaf7 HeapFree 58995->59000 59001 7ff8a931ab30 58995->59001 58997->58929 58997->58930 58998->58995 58999->58995 59000->58995 59002 7ff8a931ab4b 59001->59002 59003 7ff8a931abef 59001->59003 59008 7ff8a931ad10 HeapFree 59002->59008 59009 7ff8a931ae83 HeapFree 59002->59009 59011 7ff8a931ab85 59002->59011 59014 7ff8a931ae9d 59002->59014 59007 7ff8a931ac30 HeapFree 59003->59007 59010 7ff8a931ac50 HeapFree 59003->59010 59013 7ff8a931abe8 59003->59013 59007->59007 59007->59010 59008->59002 59008->59011 59009->59011 59010->59013 59011->59013 59015 7ff8a930b710 49 API calls 59011->59015 59013->58995 59016 7ff8a930b710 49 API calls 59014->59016
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID: $Could not find central directory endInvalid digital signature header$Could not read enough bytesFromUtf8Errorbyteserrorinvalid seek to a negative or overflowing position$Support for multi-disk files is not implemented$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$not yet implemented
                                                          • API String ID: 3298025750-2485186637
                                                          • Opcode ID: c4b90692a326a39c1ee03051f65a85d70b65fc544d6c06a9caec84f7dcd05278
                                                          • Instruction ID: 86786f74de1aff722fc68617f8df7eaaa882c9c31f451b25a92716ed0dd69b28
                                                          • Opcode Fuzzy Hash: c4b90692a326a39c1ee03051f65a85d70b65fc544d6c06a9caec84f7dcd05278
                                                          • Instruction Fuzzy Hash: 05832722A0EBC291EA718F55E4443BEA3B0FB88784F406176DA8D87B99DF7DD544CB40
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$EnvironmentStrings
                                                          • String ID: .exeprogram not found$PATHlibrary\std\src\sys_common\process.rs$\?\\$]?\\$assertion failed: self.height > 0
                                                          • API String ID: 2767186067-2173948767
                                                          • Opcode ID: c17e2ad06564bcccafbd6c05015ad6f98d51abece7a6af01462acf521588f66e
                                                          • Instruction ID: 91240681ad54e6ec13c49b811ba2d556f551c8c8f946bcf44ea391bb64c09917
                                                          • Opcode Fuzzy Hash: c17e2ad06564bcccafbd6c05015ad6f98d51abece7a6af01462acf521588f66e
                                                          • Instruction Fuzzy Hash: BF437F62A0EEC298EB709F2598443FA23B0FB947D9F456135DE4D9BB95DF38A641C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heap$Free$memset$AllocCreateErrorLast
                                                          • String ID: assertion failed: filled <= self.buf.init/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\core\src\io\borrowed_buf.rs$called `Result::unwrap()` on an `Err` value
                                                          • API String ID: 3318353824-3437382133
                                                          • Opcode ID: f8b0440f740472aa827fe5618991f08f232e5b2608e4990d56343ae69d6835da
                                                          • Instruction ID: 5384395ef807d63c91fd8e2bd7c27c54190910e5141134c923f8daefeb8c279b
                                                          • Opcode Fuzzy Hash: f8b0440f740472aa827fe5618991f08f232e5b2608e4990d56343ae69d6835da
                                                          • Instruction Fuzzy Hash: 5CA26E32A0EFC691EA619F56A4403FAA3B0FB88784F446175DA8D87B99DF7CE145C700
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heap$Free$memset$AllocCreateErrorLast
                                                          • String ID:
                                                          • API String ID: 3318353824-0
                                                          • Opcode ID: 0f2515f124c1592589ab2ecb66db3a6e618d4787a464105d79b420a0954ba612
                                                          • Instruction ID: 7a8853d97a931cb97b9a38990318550239dc0257c1bca66d8d40bb9aad98c0ad
                                                          • Opcode Fuzzy Hash: 0f2515f124c1592589ab2ecb66db3a6e618d4787a464105d79b420a0954ba612
                                                          • Instruction Fuzzy Hash: 87425D25A0EFC6A5EA60DF52A4503BA63B1FB887C4F446176DA8D87B99DF7CE440C700
                                                          APIs
                                                          Strings
                                                          • Could not find central directory endInvalid digital signature header, xrefs: 00007FF8A930487C
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle$FilePointer
                                                          • String ID: Could not find central directory endInvalid digital signature header
                                                          • API String ID: 3729840729-3300676640
                                                          • Opcode ID: c83bbb4460c5725f1825f1a45840ff78f6c1bfa055ae816c12aabffbfe23627b
                                                          • Instruction ID: ce5eabc895989c1d7d9dc1b98798e1acaeace5de96a990bbe742c4e7f1f31758
                                                          • Opcode Fuzzy Hash: c83bbb4460c5725f1825f1a45840ff78f6c1bfa055ae816c12aabffbfe23627b
                                                          • Instruction Fuzzy Hash: A5724B61A0EAC690FA749F51A4587FEA3B0FB887C0F406135DA8D86B99EF7DD544CB00

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2679 7ff8a93100b0-7ff8a93100c2 2680 7ff8a93100c8-7ff8a93100d3 TlsGetValue 2679->2680 2681 7ff8a931018c-7ff8a93101a3 call 7ff8a931cb30 TlsGetValue 2679->2681 2682 7ff8a93100d9 2680->2682 2683 7ff8a9310377-7ff8a9310381 2680->2683 2681->2682 2690 7ff8a93101a9 2681->2690 2685 7ff8a93100df-7ff8a9310109 BCryptGenRandom 2682->2685 2686 7ff8a9310185-7ff8a9310187 2682->2686 2688 7ff8a931010b-7ff8a9310121 SystemFunction036 2685->2688 2689 7ff8a931012f-7ff8a931014d 2685->2689 2686->2683 2688->2689 2691 7ff8a9310123-7ff8a9310129 2688->2691 2692 7ff8a93101ae-7ff8a93101c0 call 7ff8a9350390 2689->2692 2693 7ff8a931014f-7ff8a931015c 2689->2693 2690->2683 2691->2689 2695 7ff8a93103d2-7ff8a93103e8 call 7ff8a934b740 2691->2695 2696 7ff8a931015e-7ff8a9310183 2692->2696 2697 7ff8a93101c2-7ff8a93101d1 call 7ff8a93129b0 2692->2697 2693->2696 2693->2697 2704 7ff8a93103f9-7ff8a9310476 call 7ff8a93099c0 2695->2704 2705 7ff8a93103ea-7ff8a93103f4 call 7ff8a9308de0 2695->2705 2701 7ff8a93101d6-7ff8a931020f call 7ff8a934b740 2696->2701 2697->2701 2709 7ff8a93103af-7ff8a93103b9 call 7ff8a9308de0 2701->2709 2710 7ff8a9310215-7ff8a9310303 call 7ff8a934b740 2701->2710 2711 7ff8a931047b-7ff8a9310490 2704->2711 2705->2704 2717 7ff8a93103be-7ff8a93103cd call 7ff8a9308de0 2709->2717 2710->2717 2718 7ff8a9310309-7ff8a9310322 2710->2718 2714 7ff8a9310492 2711->2714 2715 7ff8a9310497-7ff8a931049c 2711->2715 2714->2715 2719 7ff8a93104ba-7ff8a93104c7 call 7ff8a9354020 2715->2719 2720 7ff8a931049e-7ff8a93104a3 2715->2720 2717->2711 2724 7ff8a9310382-7ff8a9310390 call 7ff8a931cb30 2718->2724 2725 7ff8a9310324 2718->2725 2731 7ff8a93104c9-7ff8a93104ce 2719->2731 2732 7ff8a93104e5-7ff8a9310512 call 7ff8a930bb00 call 7ff8a9310090 call 7ff8a9354020 2719->2732 2726 7ff8a93104a9-7ff8a93104b5 HeapFree 2720->2726 2727 7ff8a93104a5 2720->2727 2730 7ff8a9310326-7ff8a9310336 TlsGetValue 2724->2730 2725->2730 2726->2719 2727->2726 2734 7ff8a9310338-7ff8a9310345 TlsSetValue 2730->2734 2735 7ff8a9310392-7ff8a93103ab call 7ff8a931cb30 TlsSetValue 2730->2735 2736 7ff8a93104d0 2731->2736 2737 7ff8a93104d4-7ff8a93104e0 HeapFree 2731->2737 2752 7ff8a9310518-7ff8a9310520 call 7ff8a931cb30 2732->2752 2753 7ff8a9310514-7ff8a9310516 2732->2753 2740 7ff8a9310374 2734->2740 2741 7ff8a9310347-7ff8a931034d 2734->2741 2735->2741 2748 7ff8a93103ad 2735->2748 2736->2737 2737->2732 2740->2683 2742 7ff8a931034f-7ff8a9310353 2741->2742 2743 7ff8a9310363-7ff8a931036f HeapFree 2741->2743 2742->2743 2746 7ff8a9310355-7ff8a931035e HeapFree 2742->2746 2743->2740 2746->2743 2748->2740 2754 7ff8a9310522-7ff8a9310532 TlsSetValue 2752->2754 2753->2754 2756 7ff8a9310548-7ff8a931055e HeapFree 2754->2756 2757 7ff8a9310534-7ff8a9310538 2754->2757 2760 7ff8a9310560-7ff8a9310562 2756->2760 2761 7ff8a9310564-7ff8a931056c call 7ff8a931cb30 2756->2761 2757->2756 2759 7ff8a931053a-7ff8a9310543 HeapFree 2757->2759 2759->2756 2762 7ff8a931056e-7ff8a931057c TlsSetValue 2760->2762 2761->2762
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Value$FreeHeap$CryptFunction036RandomSystem
                                                          • String ID:
                                                          • API String ID: 624231926-0
                                                          • Opcode ID: ae8b67c069fc6a6538d17bba60d52f65b0d460899ef88f32a76e1195104b1311
                                                          • Instruction ID: 559c281e9c4be8c7cf8e6c0d7cc1e19b2bc2a92133f080e04d0566a4ccfe5dd7
                                                          • Opcode Fuzzy Hash: ae8b67c069fc6a6538d17bba60d52f65b0d460899ef88f32a76e1195104b1311
                                                          • Instruction Fuzzy Hash: B3D19121A0EEC1A5FA259F25A4053F963B1FF847C4F14A135DA8D927A6EF3DE581C300
                                                          APIs
                                                          Strings
                                                          • Could not find central directory endInvalid digital signature header, xrefs: 00007FF8A930487C
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FilePointer$CloseHandleObjectSingleWait
                                                          • String ID: Could not find central directory endInvalid digital signature header
                                                          • API String ID: 3992305260-3300676640
                                                          • Opcode ID: 6cc641dd63fe91e49ee1acb258626946365351447a58138e7c75619544ea830f
                                                          • Instruction ID: de97c452fba625d93bcf9bb063e6d89015671f5fb07975dd427f8814e104d0c6
                                                          • Opcode Fuzzy Hash: 6cc641dd63fe91e49ee1acb258626946365351447a58138e7c75619544ea830f
                                                          • Instruction Fuzzy Hash: 2C52286260EBD691FA748F41A4987BEA3B0FB887C0F405135DA8D86B99EF7CD545CB00
                                                          APIs
                                                          Strings
                                                          • Could not find central directory endInvalid digital signature header, xrefs: 00007FF8A930487C
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$ErrorFileLastPointer$CloseHandle
                                                          • String ID: Could not find central directory endInvalid digital signature header
                                                          • API String ID: 3659737114-3300676640
                                                          • Opcode ID: da81dc628056563b111023516c86e316270a5d10d0cba6abbb57364ad9dc5944
                                                          • Instruction ID: 521c7b3b6309d8a347a915b70a72c1f7cf4cb81958d854d7a6e021eea37c54db
                                                          • Opcode Fuzzy Hash: da81dc628056563b111023516c86e316270a5d10d0cba6abbb57364ad9dc5944
                                                          • Instruction Fuzzy Hash: 3452296260EBD691FA748B41A4987FEA3B0FB887C0F405135DA8D86B99EF7CD545CB00

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3746 7ff8a9347c00-7ff8a9347c55 3747 7ff8a9347c60-7ff8a9347c72 GetCurrentProcessId 3746->3747 3748 7ff8a9347ca8-7ff8a9347d25 call 7ff8a9309320 3747->3748 3749 7ff8a9347c74 3747->3749 3753 7ff8a9347d3c-7ff8a9347d66 3748->3753 3754 7ff8a9347d27-7ff8a9347d37 HeapFree 3748->3754 3750 7ff8a9347c80-7ff8a9347ca6 ProcessPrng 3749->3750 3750->3748 3750->3750 3755 7ff8a9347d68-7ff8a9347d6f 3753->3755 3756 7ff8a9347d80-7ff8a9347d95 3753->3756 3754->3753 3757 7ff8a9347d71-7ff8a9347d75 3755->3757 3758 7ff8a9347da0-7ff8a9347db2 3755->3758 3759 7ff8a9347e54-7ff8a9347e68 call 7ff8a934b740 3756->3759 3760 7ff8a9347e01-7ff8a9347e04 3757->3760 3761 7ff8a9347df5-7ff8a9347dfe 3758->3761 3762 7ff8a9347db4-7ff8a9347dc5 3758->3762 3772 7ff8a93482e8-7ff8a93482ed 3759->3772 3773 7ff8a9347e6e-7ff8a9347e86 3759->3773 3766 7ff8a9347e06-7ff8a9347e46 3760->3766 3761->3760 3764 7ff8a934813c-7ff8a934814f 3762->3764 3765 7ff8a9347dcb-7ff8a9347dee 3762->3765 3764->3760 3771 7ff8a9348155-7ff8a934817e 3764->3771 3765->3760 3768 7ff8a9347df0 3765->3768 3769 7ff8a9347e4c-7ff8a9347e50 3766->3769 3770 7ff8a93482f1-7ff8a93482fb call 7ff8a9308d80 3766->3770 3768->3771 3769->3759 3778 7ff8a9348300-7ff8a934830b 3770->3778 3771->3766 3772->3770 3775 7ff8a9347ea1-7ff8a9347ea4 3773->3775 3776 7ff8a9347f10-7ff8a9347f15 3775->3776 3777 7ff8a9347ea6-7ff8a9347eaa 3775->3777 3783 7ff8a9347f1b-7ff8a9347f2e 3776->3783 3784 7ff8a9348080-7ff8a93480c3 call 7ff8a9353c1c 3776->3784 3779 7ff8a9347eac-7ff8a9347eae 3777->3779 3780 7ff8a9347ef0-7ff8a9347ef4 3777->3780 3781 7ff8a934830d-7ff8a9348345 HeapFree 3778->3781 3782 7ff8a934834a-7ff8a9348358 3778->3782 3785 7ff8a9347eb1-7ff8a9347eb4 3779->3785 3780->3776 3787 7ff8a9347ef6-7ff8a9347efd 3780->3787 3781->3782 3788 7ff8a9348368-7ff8a934836b 3782->3788 3789 7ff8a934835a-7ff8a9348363 HeapFree 3782->3789 3790 7ff8a9347f90-7ff8a9347f96 3783->3790 3791 7ff8a9347f30-7ff8a9347f36 3783->3791 3803 7ff8a93480c9-7ff8a93480e3 GetLastError 3784->3803 3804 7ff8a93481f6-7ff8a93481f9 3784->3804 3794 7ff8a9347e90-7ff8a9347e93 3785->3794 3795 7ff8a9347eb6-7ff8a9347ee4 3785->3795 3796 7ff8a9347f03-7ff8a9347f08 3787->3796 3797 7ff8a9347fd2-7ff8a9347fe3 3787->3797 3798 7ff8a934836d-7ff8a9348370 CloseHandle 3788->3798 3799 7ff8a9348375-7ff8a934837e call 7ff8a9354020 3788->3799 3789->3788 3802 7ff8a9347e96-7ff8a9347e9e 3790->3802 3800 7ff8a93482df 3791->3800 3801 7ff8a9347f3c-7ff8a9347f7e 3791->3801 3794->3802 3795->3791 3796->3785 3805 7ff8a9348023-7ff8a934802f 3797->3805 3806 7ff8a9347fe5-7ff8a9347ff5 3797->3806 3798->3799 3810 7ff8a93482e1-7ff8a93482e6 call 7ff8a9308d80 3800->3810 3808 7ff8a9347f9b 3801->3808 3809 7ff8a9347f80-7ff8a9347f8d 3801->3809 3802->3775 3812 7ff8a93480e9-7ff8a93480ec 3803->3812 3813 7ff8a9348183-7ff8a934819c 3803->3813 3814 7ff8a934820c-7ff8a9348264 call 7ff8a933ad60 3804->3814 3815 7ff8a93481fb-7ff8a9348207 HeapFree 3804->3815 3817 7ff8a9348036-7ff8a9348049 3805->3817 3816 7ff8a9347ff7-7ff8a934801a 3806->3816 3806->3817 3811 7ff8a9347f9d-7ff8a9347fba call 7ff8a9322450 3808->3811 3809->3811 3810->3778 3837 7ff8a9347fc0-7ff8a9347fcd 3811->3837 3838 7ff8a93482d1-7ff8a93482dd 3811->3838 3822 7ff8a93480ee-7ff8a93480f4 3812->3822 3823 7ff8a9348100-7ff8a9348103 3812->3823 3827 7ff8a934819e-7ff8a93481aa HeapFree 3813->3827 3828 7ff8a93481af-7ff8a93481bd 3813->3828 3832 7ff8a9348269-7ff8a934826c 3814->3832 3815->3814 3825 7ff8a934804b-7ff8a934806c 3816->3825 3826 7ff8a934801c 3816->3826 3817->3825 3817->3826 3830 7ff8a934810d-7ff8a934811e call 7ff8a931cdc0 3822->3830 3823->3813 3831 7ff8a9348105-7ff8a934810b 3823->3831 3825->3784 3826->3805 3827->3828 3833 7ff8a93481cd-7ff8a93481d1 3828->3833 3834 7ff8a93481bf-7ff8a93481c8 HeapFree 3828->3834 3830->3747 3845 7ff8a9348124-7ff8a9348137 HeapFree 3830->3845 3831->3813 3831->3830 3840 7ff8a934826e-7ff8a934828e 3832->3840 3841 7ff8a9348299-7ff8a93482b8 3832->3841 3835 7ff8a93481db-7ff8a93481f5 3833->3835 3836 7ff8a93481d3-7ff8a93481d6 CloseHandle 3833->3836 3834->3833 3836->3835 3837->3802 3838->3810 3840->3834 3843 7ff8a9348294 3840->3843 3841->3835 3844 7ff8a93482be-7ff8a93482cc HeapFree 3841->3844 3843->3833 3844->3835 3845->3747
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentFreeHeapPrng
                                                          • String ID:
                                                          • API String ID: 2687294623-0
                                                          • Opcode ID: 7ccca035b553b490dbd6fd33f35a1768fee40fbe1abdc2761106d4094eca36f5
                                                          • Instruction ID: cb986c3e8404820dca2013b897766ecf440c7ffd823585058cff4c6ea4d7a06d
                                                          • Opcode Fuzzy Hash: 7ccca035b553b490dbd6fd33f35a1768fee40fbe1abdc2761106d4094eca36f5
                                                          • Instruction Fuzzy Hash: C812D322A0EED199E7548F25D8003BA2BB0FB887E8F056636DE6E877D4DF79D4449340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heap$Free$memset$AllocCreateErrorLastmalloc
                                                          • String ID:
                                                          • API String ID: 2998993497-0
                                                          • Opcode ID: f8e63a3019b5660a97cd2ff614013b9790c29846fd5139ed2c4ddc969cac8dfc
                                                          • Instruction ID: 19c97420669df564dba2274711ba97cdb1f2870c27aaaa4088e14a8a9f22ea40
                                                          • Opcode Fuzzy Hash: f8e63a3019b5660a97cd2ff614013b9790c29846fd5139ed2c4ddc969cac8dfc
                                                          • Instruction Fuzzy Hash: 95E1473290EFC591E6358F59E4443EAA3B4FB98384F046236DACD82AA9DF7DD545CB00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heap$Free$memset$AllocCreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 493596415-0
                                                          • Opcode ID: 366fe9f9771c2bf008d50867babc19da5d5e01b03df766db2f5eff1cb8254fd0
                                                          • Instruction ID: 4702742aa2e7c53a76fc9cb9739968581b8ab0f652eeeecc47cdbd487ca3c952
                                                          • Opcode Fuzzy Hash: 366fe9f9771c2bf008d50867babc19da5d5e01b03df766db2f5eff1cb8254fd0
                                                          • Instruction Fuzzy Hash: 55D16B2290EFC691EA359F55A4443FAA3B4FB88384F446176DA8D86A99DF7CD540CB00

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorObjectSingleStatusWait
                                                          • String ID:
                                                          • API String ID: 4189389217-0
                                                          • Opcode ID: 84ea623b709b3c50245635ff3630c2954d6b734c081a746034ccf4ef537e84bf
                                                          • Instruction ID: 42305de5a61e25c6e47200a45a9d60691c059db22204f1daeb731411e51019f6
                                                          • Opcode Fuzzy Hash: 84ea623b709b3c50245635ff3630c2954d6b734c081a746034ccf4ef537e84bf
                                                          • Instruction Fuzzy Hash: E421D862B18EC199F710DF34D4403E937B1EB59398F54A231EA5D82694EF38E1D58740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 5d17924f1650dce35aa6cfa67234e302229330514130ed1fd0e34ce5b20ef98f
                                                          • Instruction ID: 7ac3db583bb68e5f6a21f847f9e51aebadb40fdf62023ea763b7328ba8f7d42c
                                                          • Opcode Fuzzy Hash: 5d17924f1650dce35aa6cfa67234e302229330514130ed1fd0e34ce5b20ef98f
                                                          • Instruction Fuzzy Hash: 59B18330716E098BCF59EA28D8C57AAB3D2FB98314F14426DC84FC7645EB31E946CB81
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Invalid checksum
                                                          • API String ID: 0-2521479841
                                                          • Opcode ID: 703e369a81616febad43ec029551244bee53fdc5b60c7c96c89b9f8e7664f4e7
                                                          • Instruction ID: 1897aff086fa65400c456fdf069a2757b3567566fbb45339e44d3f42595e2f8a
                                                          • Opcode Fuzzy Hash: 703e369a81616febad43ec029551244bee53fdc5b60c7c96c89b9f8e7664f4e7
                                                          • Instruction Fuzzy Hash: 485183A6A1AAC59BDA64CF25E1403BAB3B1FB497C0F55A531CF8E97681DF7CE4448300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a66aa8eccb36b3c863fa0cf2326f118ce4658279e53cce5a51b176019e00911a
                                                          • Instruction ID: 2ec0d2ab2e4a7412aa2d7bb5a9ab67d7bddd765b0e3e4300f711e349f42f4e62
                                                          • Opcode Fuzzy Hash: a66aa8eccb36b3c863fa0cf2326f118ce4658279e53cce5a51b176019e00911a
                                                          • Instruction Fuzzy Hash: 6ED15C31508A488BDF59DF28C899AEAB7E1FF98310F14466DE88BCB255DF30E542CB41

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFreeHandleHeap$ErrorLastObjectSingleWait
                                                          • String ID:
                                                          • API String ID: 3984667017-0
                                                          • Opcode ID: 0283a4135becd2feb7365369f589644439a9485a2e6ce45569da4ce2485d9264
                                                          • Instruction ID: 9c4c4087da006db93ad2b98f38703e7b151804b53b8abbe02f90c758e9d8060f
                                                          • Opcode Fuzzy Hash: 0283a4135becd2feb7365369f589644439a9485a2e6ce45569da4ce2485d9264
                                                          • Instruction Fuzzy Hash: 1C512C22A0EFC1A8E7609F61D8543F923A1FB887C8F056135EE4D8BA99DF38D185C340

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3874 7ff8a934a030-7ff8a934a05f 3875 7ff8a934a065-7ff8a934a077 3874->3875 3876 7ff8a934a442-7ff8a934a455 call 7ff8a930a6d0 3874->3876 3878 7ff8a934a07d-7ff8a934a1ba 3875->3878 3879 7ff8a934a45a-7ff8a934a46d call 7ff8a930a6d0 3875->3879 3876->3879 3880 7ff8a934a1c0-7ff8a934a22d memcpy * 4 3878->3880 3881 7ff8a934a472-7ff8a934a48b call 7ff8a930a6d0 3878->3881 3879->3881 3883 7ff8a934a35b-7ff8a934a35e 3880->3883 3884 7ff8a934a233-7ff8a934a236 3880->3884 3887 7ff8a934a364-7ff8a934a377 call 7ff8a930a6d0 3883->3887 3889 7ff8a934a42e-7ff8a934a441 3883->3889 3886 7ff8a934a23c-7ff8a934a280 memcpy * 2 3884->3886 3884->3887 3890 7ff8a934a2c2-7ff8a934a2c7 3886->3890 3891 7ff8a934a282-7ff8a934a293 3886->3891 3896 7ff8a934a37c-7ff8a934a382 3887->3896 3894 7ff8a934a2c9 3890->3894 3895 7ff8a934a33b-7ff8a934a33f 3890->3895 3893 7ff8a934a2a0-7ff8a934a2bd 3891->3893 3893->3893 3898 7ff8a934a2bf 3893->3898 3899 7ff8a934a2d0-7ff8a934a339 3894->3899 3895->3889 3900 7ff8a934a345-7ff8a934a352 3895->3900 3897 7ff8a934a390-7ff8a934a402 3896->3897 3897->3897 3901 7ff8a934a404-7ff8a934a407 3897->3901 3898->3890 3899->3895 3899->3899 3900->3896 3902 7ff8a934a354-7ff8a934a356 3900->3902 3901->3889 3903 7ff8a934a409 3901->3903 3902->3901 3904 7ff8a934a410-7ff8a934a42c 3903->3904 3904->3889 3904->3904
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID: assertion failed: old_left_len + count <= CAPACITY$called `Result::unwrap()` on an `Err` value
                                                          • API String ID: 3510742995-3830370267
                                                          • Opcode ID: e3b527eafe33025758db7741472c57905f51d41c3744399735a7fe8a0eb27357
                                                          • Instruction ID: ab36542c105a747523b3e5f04d2e80f6c24d851f038d7eee01db755ef30460e9
                                                          • Opcode Fuzzy Hash: e3b527eafe33025758db7741472c57905f51d41c3744399735a7fe8a0eb27357
                                                          • Instruction Fuzzy Hash: C5C1E362A19FC492EA458F18E4053FA6774FB98BD8F46A336DE4D53361DF38A295C300

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 3905 7ff8a933ad60-7ff8a933ad9c call 7ff8a933b0d0 3908 7ff8a933adcb-7ff8a933add0 3905->3908 3909 7ff8a933ad9e-7ff8a933adc9 call 7ff8a933b270 3905->3909 3910 7ff8a933add3-7ff8a933ade0 3908->3910 3909->3908 3913 7ff8a933ade1-7ff8a933adeb 3909->3913 3914 7ff8a933aded-7ff8a933adef 3913->3914 3915 7ff8a933adf7-7ff8a933adf9 3913->3915 3916 7ff8a933adfb-7ff8a933ae03 3914->3916 3917 7ff8a933adf1-7ff8a933adf5 3914->3917 3915->3916 3918 7ff8a933ae23-7ff8a933ae27 3915->3918 3919 7ff8a933ae37-7ff8a933ae3b 3916->3919 3920 7ff8a933ae05-7ff8a933ae07 3916->3920 3917->3919 3921 7ff8a933ae09-7ff8a933ae1b 3918->3921 3922 7ff8a933ae29-7ff8a933ae2d 3918->3922 3923 7ff8a933ae4d-7ff8a933ae4f 3919->3923 3924 7ff8a933ae3d-7ff8a933ae3f 3919->3924 3920->3919 3920->3921 3925 7ff8a933ae21 3921->3925 3926 7ff8a933af76-7ff8a933af7d 3921->3926 3922->3921 3927 7ff8a933ae2f-7ff8a933ae33 3922->3927 3928 7ff8a933ae51-7ff8a933ae59 3923->3928 3930 7ff8a933ae60-7ff8a933ae70 3923->3930 3924->3928 3929 7ff8a933ae41-7ff8a933ae49 3924->3929 3925->3910 3931 7ff8a933af80-7ff8a933af8a HeapFree 3926->3931 3927->3921 3932 7ff8a933ae35 3927->3932 3933 7ff8a933ae5b-7ff8a933ae5e 3928->3933 3935 7ff8a933ae72-7ff8a933ae76 3928->3935 3929->3933 3934 7ff8a933ae4b 3929->3934 3930->3933 3930->3935 3936 7ff8a933af8f-7ff8a933af92 3931->3936 3932->3919 3937 7ff8a933aeb2-7ff8a933aef1 CreateFileW 3933->3937 3934->3935 3938 7ff8a933ae78-7ff8a933ae94 3935->3938 3939 7ff8a933ae96-7ff8a933ae98 3935->3939 3936->3910 3942 7ff8a933af59-7ff8a933af70 GetLastError 3937->3942 3943 7ff8a933aef3-7ff8a933aefc 3937->3943 3938->3937 3940 7ff8a933ae9a-7ff8a933ae9c 3939->3940 3941 7ff8a933aea5-7ff8a933aea7 3939->3941 3946 7ff8a933ae9e-7ff8a933aea3 3940->3946 3947 7ff8a933aead 3940->3947 3941->3921 3941->3947 3942->3910 3942->3926 3944 7ff8a933af39-7ff8a933af3c 3943->3944 3945 7ff8a933aefe-7ff8a933af02 3943->3945 3949 7ff8a933af3e-7ff8a933af54 HeapFree 3944->3949 3950 7ff8a933af97-7ff8a933af99 3944->3950 3945->3944 3948 7ff8a933af04-7ff8a933af11 GetLastError 3945->3948 3946->3937 3947->3937 3948->3944 3951 7ff8a933af13-7ff8a933af34 SetFileInformationByHandle 3948->3951 3949->3910 3950->3910 3952 7ff8a933af9e-7ff8a933afbd GetLastError CloseHandle 3951->3952 3953 7ff8a933af36 3951->3953 3952->3936 3954 7ff8a933afbf-7ff8a933afc6 3952->3954 3953->3944 3954->3931
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast$FileHandle$CloseCreateInformation
                                                          • String ID:
                                                          • API String ID: 2929975209-0
                                                          • Opcode ID: bf0755fff651767cf1758b4d0d115d4b57a12b3911173819cc5caea59d121a5b
                                                          • Instruction ID: 19b22f205de407be0314082760c83afd3414c86ac1c93678dafca07ba64725d4
                                                          • Opcode Fuzzy Hash: bf0755fff651767cf1758b4d0d115d4b57a12b3911173819cc5caea59d121a5b
                                                          • Instruction Fuzzy Hash: 7261AB61A4EAD2AAFB608E6195503BB37B1EF457C4F046138DE4DC7AC5DF2DE8A58300

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$ErrorFreeHeapLast$ObjectSingleWait
                                                          • String ID:
                                                          • API String ID: 908592504-0
                                                          • Opcode ID: 7ca30f4d0e87251ee3208c063649d60706380cd71cdd1fff159d1b938df2f73b
                                                          • Instruction ID: c26f8d6d1d6526cab5dcc659fabfe5d4e190736f4a6494136546ac18c3b503d1
                                                          • Opcode Fuzzy Hash: 7ca30f4d0e87251ee3208c063649d60706380cd71cdd1fff159d1b938df2f73b
                                                          • Instruction Fuzzy Hash: A2411A22A0AFC1A8E7619F61D8503E933A0FB847D8F056535EE4D8BA99DF78D1C5C340

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 2056089037-0
                                                          • Opcode ID: 7cc5e5206444c032cad7c63e4a0b720ec1d163a654cee290d0c39fcc05128369
                                                          • Instruction ID: d255f808d8c79b6ce303850b1e16b20b07958acaed1349d700dd45f568cc4213
                                                          • Opcode Fuzzy Hash: 7cc5e5206444c032cad7c63e4a0b720ec1d163a654cee290d0c39fcc05128369
                                                          • Instruction Fuzzy Hash: 92417F22A0EF81A5EA249F62D5113BD76B0EF88BC0F05A432DE4E87796DF7CE5418300

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4491 26f0c34-26f0c50 4492 26f0c6b-26f0c7a 4491->4492 4493 26f0c52-26f0c56 4491->4493 4495 26f0c7c-26f0ca1 4492->4495 4496 26f0ca6-26f0cb8 4492->4496 4493->4492 4494 26f0c58-26f0c69 4493->4494 4494->4492 4494->4493 4495->4496 4497 26f0cbb-26f0cc2 4496->4497 4498 26f0cfd-26f0d02 LoadLibraryA 4497->4498 4499 26f0cc4-26f0cd3 4497->4499 4502 26f0d05-26f0d14 4498->4502 4500 26f0cd5-26f0cee call 26f14a0 4499->4500 4501 26f0cf0-26f0cf6 4499->4501 4500->4501 4506 26f0d15-26f0d18 4500->4506 4501->4497 4504 26f0cf8-26f0cfb 4501->4504 4504->4498 4504->4502 4506->4502
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: LibraryLoad
                                                          • String ID: l
                                                          • API String ID: 1029625771-2517025534
                                                          • Opcode ID: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                                                          • Instruction ID: a16e9988cefc54a5f7daecabd78e72426e13eb12c33895e04657e4e286eeb1a6
                                                          • Opcode Fuzzy Hash: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                                                          • Instruction Fuzzy Hash: 0031B12051CA898FDB99EB2CC044B26BBD5FB9A308F2456BCC5DEC725BD734D44A8705

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4507 26ef1a8-26ef1df 4508 26ef27f-26ef286 4507->4508 4509 26ef1e5-26ef1f8 CLRCreateInstance 4507->4509 4510 26ef288-26ef2a1 4508->4510 4511 26ef2a9-26ef2ab 4508->4511 4512 26ef1fe-26ef23a 4509->4512 4513 26ef2b8-26ef2bb 4509->4513 4510->4511 4514 26ef2bd-26ef2c9 4511->4514 4515 26ef2ad-26ef2b3 4511->4515 4524 26ef23c-26ef24f 4512->4524 4525 26ef278-26ef279 4512->4525 4513->4510 4519 26ef2cf-26ef2dd 4514->4519 4520 26ef3fa-26ef3fb 4514->4520 4517 26ef3fd-26ef418 4515->4517 4522 26ef2df-26ef2e7 4519->4522 4523 26ef2f1-26ef331 4519->4523 4520->4517 4528 26ef2ec-26ef2ef 4522->4528 4531 26ef339-26ef33c 4523->4531 4524->4510 4530 26ef251-26ef259 4524->4530 4526 26ef27b-26ef27d 4525->4526 4526->4508 4526->4510 4528->4531 4530->4526 4532 26ef25b-26ef271 4530->4532 4531->4520 4534 26ef342-26ef357 4531->4534 4535 26ef276 4532->4535 4534->4520 4538 26ef35d-26ef38e SafeArrayCreate 4534->4538 4535->4526 4538->4520 4539 26ef390-26ef39c 4538->4539 4540 26ef39e-26ef3b1 4539->4540 4541 26ef3b3-26ef3bf 4539->4541 4540->4540 4540->4541 4542 26ef3c7-26ef3d9 4541->4542 4543 26ef3db-26ef3ef 4542->4543 4544 26ef3f1-26ef3f2 4542->4544 4543->4543 4543->4544 4544->4520
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID: Create$ArrayInstanceSafe
                                                          • String ID:
                                                          • API String ID: 3625591093-0
                                                          • Opcode ID: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                                                          • Instruction ID: 1072becc0737f3202ea4969d0e76332f5467509407a64cd66ace3626b64ff8ec
                                                          • Opcode Fuzzy Hash: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                                                          • Instruction Fuzzy Hash: 0B818C31219A488FCB68EF28C889AE6B7E1FF99305F10466DD49BC7555EB30E505CBC2

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4545 7ff8a934b420-7ff8a934b434 4546 7ff8a934b58e-7ff8a934b5a3 call 7ff8a934b5b0 4545->4546 4547 7ff8a934b43a-7ff8a934b447 4545->4547 4549 7ff8a934b45d-7ff8a934b464 4547->4549 4550 7ff8a934b449-7ff8a934b455 4547->4550 4554 7ff8a934b46a-7ff8a934b49f ReadFile 4549->4554 4555 7ff8a934b571-7ff8a934b589 call 7ff8a93223b0 4549->4555 4552 7ff8a934b45b 4550->4552 4553 7ff8a934b553-7ff8a934b56b call 7ff8a93223b0 4550->4553 4552->4549 4553->4554 4553->4555 4556 7ff8a934b4bb-7ff8a934b4e6 GetLastError 4554->4556 4557 7ff8a934b4a1 4554->4557 4562 7ff8a934b4e8-7ff8a934b4f5 4556->4562 4563 7ff8a934b505-7ff8a934b50d 4556->4563 4560 7ff8a934b4a4-7ff8a934b4ac 4557->4560 4565 7ff8a934b4fd 4560->4565 4566 7ff8a934b4ae-7ff8a934b4b9 4560->4566 4567 7ff8a934b52f-7ff8a934b533 4562->4567 4568 7ff8a934b4f7-7ff8a934b4fb 4562->4568 4569 7ff8a934b511-7ff8a934b52d call 7ff8a931cdc0 4563->4569 4570 7ff8a934b501-7ff8a934b503 4565->4570 4566->4570 4572 7ff8a934b535-7ff8a934b53f 4567->4572 4568->4569 4569->4567 4574 7ff8a934b540-7ff8a934b543 4569->4574 4570->4572 4574->4560 4575 7ff8a934b549-7ff8a934b54e 4574->4575 4575->4566
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastRead
                                                          • String ID:
                                                          • API String ID: 1948546556-0
                                                          • Opcode ID: cf86975247f2381394c3fa81f86474c0d37b8e7bdd7153a08527b21d0506428a
                                                          • Instruction ID: 71d96bc2262ff3258630dbbd6d06a40f9b067d7f0116066b4dc611f88bd69dec
                                                          • Opcode Fuzzy Hash: cf86975247f2381394c3fa81f86474c0d37b8e7bdd7153a08527b21d0506428a
                                                          • Instruction Fuzzy Hash: 80413762B0EE81A9EB248E25D5503BD22B1EB84BD4F15A435DE5D87B89DF3CE8508340

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4589 7ff8a933e2b0-7ff8a933e2de SetFilePointerEx 4590 7ff8a933e2ec-7ff8a933e305 GetLastError 4589->4590 4591 7ff8a933e2e0-7ff8a933e2eb 4589->4591
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorFileLastPointer
                                                          • String ID:
                                                          • API String ID: 2976181284-0
                                                          • Opcode ID: b1f44e8819db8b87d30af694dc40238e1f93fb849b5f7140a6fd6c4f7c2f9852
                                                          • Instruction ID: 764adf1246ef63971147abb7f70aa6f4748c68af3474d0cdcda4ec399c8ad3f7
                                                          • Opcode Fuzzy Hash: b1f44e8819db8b87d30af694dc40238e1f93fb849b5f7140a6fd6c4f7c2f9852
                                                          • Instruction Fuzzy Hash: 66E065A5F15A81AAFB109BB194023E923B5DB4C7D4F845071DD4C97749DE3CD1D1C650

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4592 7ff8a931bb00-7ff8a931bb13 4593 7ff8a931bb19-7ff8a931bb2c 4592->4593 4594 7ff8a931bd43-7ff8a931bd58 4592->4594 4596 7ff8a931bb59-7ff8a931bb5f 4593->4596 4597 7ff8a931bd6e-7ff8a931bd88 call 7ff8a9309a00 4596->4597 4598 7ff8a931bb65-7ff8a931bb6c call 7ff8a933d9b0 4596->4598 4603 7ff8a931bd8a-7ff8a931bd8f 4597->4603 4604 7ff8a931bda7-7ff8a931bdde HeapFree call 7ff8a9354020 4597->4604 4602 7ff8a931bb71-7ff8a931bb74 4598->4602 4605 7ff8a931bb90-7ff8a931bb93 4602->4605 4606 7ff8a931bb76-7ff8a931bb80 4602->4606 4609 7ff8a931bd91 4603->4609 4610 7ff8a931bd96-7ff8a931bda2 HeapFree 4603->4610 4616 7ff8a931be6e 4604->4616 4617 7ff8a931bde4-7ff8a931bdfb 4604->4617 4607 7ff8a931bd59-7ff8a931c52d call 7ff8a934b740 4605->4607 4608 7ff8a931bb99-7ff8a931bb9c 4605->4608 4606->4605 4622 7ff8a931c5aa-7ff8a931c5b4 call 7ff8a9308d80 4607->4622 4623 7ff8a931c52f-7ff8a931c55d call 7ff8a934b740 4607->4623 4608->4594 4608->4596 4609->4610 4610->4604 4619 7ff8a931be70-7ff8a931be7e 4616->4619 4618 7ff8a931be13-7ff8a931be24 call 7ff8a933d9b0 4617->4618 4628 7ff8a931be40-7ff8a931be43 4618->4628 4629 7ff8a931be26-7ff8a931be2f 4618->4629 4630 7ff8a931c5b9-7ff8a931c5c8 call 7ff8a9308de0 4622->4630 4623->4630 4631 7ff8a931c55f-7ff8a931c58b call 7ff8a934b740 4623->4631 4632 7ff8a931be7f-7ff8a931be82 4628->4632 4633 7ff8a931be45-7ff8a931be4b 4628->4633 4629->4628 4641 7ff8a931c5d9-7ff8a931c624 call 7ff8a931f3d0 call 7ff8a9354020 4630->4641 4643 7ff8a931c5ca-7ff8a931c5d4 call 7ff8a9308de0 4631->4643 4644 7ff8a931c58d-7ff8a931c5a9 4631->4644 4632->4619 4636 7ff8a931be4d-7ff8a931be56 4633->4636 4637 7ff8a931be84-7ff8a931beb3 call 7ff8a9309a00 4633->4637 4636->4618 4640 7ff8a931be58 4636->4640 4649 7ff8a931bec3-7ff8a931bed7 4637->4649 4650 7ff8a931beb5 4637->4650 4640->4616 4658 7ff8a931c638 4641->4658 4659 7ff8a931c626-7ff8a931c631 4641->4659 4643->4641 4652 7ff8a931bef8-7ff8a931bf06 call 7ff8a933d710 4649->4652 4651 7ff8a931beb7-7ff8a931bec2 4650->4651 4660 7ff8a931bf08-7ff8a931bf11 4652->4660 4661 7ff8a931bf20-7ff8a931bf2a 4652->4661 4659->4658 4660->4661 4662 7ff8a931bf2c-7ff8a931bf44 4661->4662 4663 7ff8a931bef2-7ff8a931bef6 4661->4663 4662->4651 4663->4650 4663->4652
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 417ccfcdd6d392e1ab4ea9851aa90fde86949172939e584f5e8103bc3f7b4771
                                                          • Instruction ID: bb888c0192c694fffb09ced815064418330c56aecb36ce294388088ae3067197
                                                          • Opcode Fuzzy Hash: 417ccfcdd6d392e1ab4ea9851aa90fde86949172939e584f5e8103bc3f7b4771
                                                          • Instruction Fuzzy Hash: 3A819112A0FEC661FE199F16A9003B966B1EF45BD0F69A431DE0DC77D5EE3CE5868200

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 4682 7ff8a93015b0-7ff8a93015bc 4683 7ff8a93015f4-7ff8a93015fb 4682->4683 4684 7ff8a93015be-7ff8a93015c1 4682->4684 4685 7ff8a93015c3-7ff8a93015c8 4684->4685 4686 7ff8a93015fc-7ff8a9301601 4684->4686 4687 7ff8a93015e5-7ff8a93015ef 4685->4687 4688 7ff8a93015ca-7ff8a93015e2 HeapFree 4685->4688 4689 7ff8a9301603-7ff8a930161b HeapFree 4686->4689 4690 7ff8a930161e-7ff8a930163b call 7ff8a9356c30 4686->4690 4691 7ff8a9367ed0-7ff8a9367edb 4687->4691 4688->4687 4689->4690 4690->4691 4694 7ff8a9367efd-7ff8a9367f02 4691->4694 4695 7ff8a9367edd-7ff8a9367ee4 4691->4695 4696 7ff8a9367ef7-7ff8a9367efc 4694->4696 4697 7ff8a9367ef5 4695->4697 4698 7ff8a9367ee6-7ff8a9367eed 4695->4698 4697->4696 4698->4697
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 0b853bdaefb4d720e9f06f81a784c19d3d437c2ce9e35980e5b6461c92e7911d
                                                          • Instruction ID: a017c865344884461eab3f90101518bc63952c6af6eed87fd70d8d3e406147e7
                                                          • Opcode Fuzzy Hash: 0b853bdaefb4d720e9f06f81a784c19d3d437c2ce9e35980e5b6461c92e7911d
                                                          • Instruction Fuzzy Hash: F6116056F0FA8591FE199F6A94903B91271DF88FD4F286471CE0E87790DE2ED8879300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 9402d9edf19d02522d5073df4f2a608842c9409e550e4dcaab2d9f77ed48b155
                                                          • Instruction ID: ba825678baaf0c7e3a3dd1ae2c13d61583311f5e252eadcb0b1dadf729a18114
                                                          • Opcode Fuzzy Hash: 9402d9edf19d02522d5073df4f2a608842c9409e550e4dcaab2d9f77ed48b155
                                                          • Instruction Fuzzy Hash: 8B119012B0FD85A1FE19DF16A4153B953B1EF49BD4F98A531DA0D87BA9EE3CE181C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: b4602efac24d704e8efb498bf7dc1e82a986760c77fb9d81fdcbdcdf967e2786
                                                          • Instruction ID: 8daf1469e7c5045bd47f6ed4d26941fa2f1a7e84692cf909779015f6a961449b
                                                          • Opcode Fuzzy Hash: b4602efac24d704e8efb498bf7dc1e82a986760c77fb9d81fdcbdcdf967e2786
                                                          • Instruction Fuzzy Hash: CDE06D50E0FEC661FD04EF1694552B953B2EF89BC4B49A531CA0DCA296DE3EE1108200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246514372.00007FF848A80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848A80000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff848a80000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: HookWindows
                                                          • String ID:
                                                          • API String ID: 2559412058-0
                                                          • Opcode ID: f5d65c09881db4579619d6b6490f884f190145bfeabf88971af2c7efdbb51f40
                                                          • Instruction ID: f4f2c787fc8723a6235566d89cff89c3f0f094bdc5df851751a3c2c232507e3e
                                                          • Opcode Fuzzy Hash: f5d65c09881db4579619d6b6490f884f190145bfeabf88971af2c7efdbb51f40
                                                          • Instruction Fuzzy Hash: 9241273190DA5C5FD708EF68D8066F97BE1EF9A320F04427FE049C3292CA64A816CBD1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CaptureContextErrorExceptionFileLastPointerRaiseUnwindabort
                                                          • String ID:
                                                          • API String ID: 664057041-0
                                                          • Opcode ID: 7751caa53c6dff08779281aebcc5d661854e2524dc5eb2e1268a2889e7a13479
                                                          • Instruction ID: d233f93173e24898178b543fa93cd0f250ab71ed8c9418c2b89b0701cd12748b
                                                          • Opcode Fuzzy Hash: 7751caa53c6dff08779281aebcc5d661854e2524dc5eb2e1268a2889e7a13479
                                                          • Instruction Fuzzy Hash: 01F08255A1EBC16AE7019F6194053E92FB0DB49B84F8950A2DE0C93746CE3CC144C311
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID:
                                                          • API String ID: 3510742995-0
                                                          • Opcode ID: 796e56474611e10859ca3eed8a75b59cacb60af6d4c730d117d832b186b9e6ac
                                                          • Instruction ID: 8b51151f6c09034fe99bd82d9bf2dbf9b7ed0a516f788be687e873815ad821a0
                                                          • Opcode Fuzzy Hash: 796e56474611e10859ca3eed8a75b59cacb60af6d4c730d117d832b186b9e6ac
                                                          • Instruction Fuzzy Hash: 5721D462B59AC6A1ED24CF0AE9086A9A731FF45BD4F589032DE4D97765EE3CE141C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: malloc
                                                          • String ID:
                                                          • API String ID: 2803490479-0
                                                          • Opcode ID: 252966722c9250e948d75cb97bb9ab9402504ab94b176e16b446967a805d112d
                                                          • Instruction ID: 2e3978b8962600f3395580273d5f2bbecea1020f2dc767bb58c09d8fdf95f5f6
                                                          • Opcode Fuzzy Hash: 252966722c9250e948d75cb97bb9ab9402504ab94b176e16b446967a805d112d
                                                          • Instruction Fuzzy Hash: F821A271A1FF42A6EB644F24944437A76B0FB48798F14AA34CB1C8A3D4DFBD9884C740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCurrentFreeHandleHeapPrng
                                                          • String ID:
                                                          • API String ID: 4199747799-0
                                                          • Opcode ID: da5180e4e16525f5817a010a155a59fe325eaa8d8fbff17c4dd8bd5caba1d194
                                                          • Instruction ID: 361c48c386675e35a159f49665015c3fc53d6f0886b79b978c6cfec3367a9cf5
                                                          • Opcode Fuzzy Hash: da5180e4e16525f5817a010a155a59fe325eaa8d8fbff17c4dd8bd5caba1d194
                                                          • Instruction Fuzzy Hash: 65F0302360AAC595EA528F25E9003BD62A4DB80FE9F199531DE0E87BD5CE7CE4C2C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID: @$assertion failed: end >= start && end <= len
                                                          • API String ID: 3510742995-884486453
                                                          • Opcode ID: 6ef8c1403187c47bb75ff94922eaf2aa0e92dc46975cd686280e47bf2c492bb2
                                                          • Instruction ID: 59df3f059bc3892ab47bf0808350042e71c48847af0697dbb94d8f2d6b8bba7f
                                                          • Opcode Fuzzy Hash: 6ef8c1403187c47bb75ff94922eaf2aa0e92dc46975cd686280e47bf2c492bb2
                                                          • Instruction Fuzzy Hash: 2FC27C32A0EFC195EB608F2198443F923B1FB697C8F54A136CA5D9BB95DF38A645C340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Handle$CurrentDuplicateProcess$CloseErrorLast
                                                          • String ID: RUST_MIN_STACKlibrary\std\src\thread\mod.rsfailed to spawn thread$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                          • API String ID: 120317985-1624771165
                                                          • Opcode ID: d08382fc645e9cff5db03e3e516b963eb1214b79fbf75101fe87d5bfd5bde891
                                                          • Instruction ID: b645b33d01fdf00a5db4ba1cc37baba1d3728d027c85110547a05af12214835a
                                                          • Opcode Fuzzy Hash: d08382fc645e9cff5db03e3e516b963eb1214b79fbf75101fe87d5bfd5bde891
                                                          • Instruction Fuzzy Hash: 3CF17B21A0FEC2A5FB21AF6198003B927B0EF84BC5F45A535EE4E87796DE3CE5458340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: e9d8596face4a468f787794731ac78344fb93b55d608c7fa3dcc526014f6c78c
                                                          • Instruction ID: b5a8a78a5f7e294c0a29dba91296cd4e1975b18f6871f647fd8a117525547894
                                                          • Opcode Fuzzy Hash: e9d8596face4a468f787794731ac78344fb93b55d608c7fa3dcc526014f6c78c
                                                          • Instruction Fuzzy Hash: 6F238D62A4AFC199E7718F25D8453EE33A4FB0579CF045239DA9D8BB99DF389291C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FullNamePath
                                                          • String ID: \\?\\\?\UNC\
                                                          • API String ID: 2482867836-3975371117
                                                          • Opcode ID: 9bfa2c458f774559e193a62b51d3fe014730c439c61672ac31edcb296a240af0
                                                          • Instruction ID: 050ec9dc059c5a3dddaac20f6897552a5a52bb54ee301acb85b7db54fa794c56
                                                          • Opcode Fuzzy Hash: 9bfa2c458f774559e193a62b51d3fe014730c439c61672ac31edcb296a240af0
                                                          • Instruction Fuzzy Hash: 03027062E4EED6A5EB609F11D4443BA23B4FB04BD4F44A13ADA5D9B6C5DF3CE6818300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FreeHeap$DirectorySystemmemcpy
                                                          • String ID: \cmd.exemaximum number of ProcThreadAttributes exceeded
                                                          • API String ID: 2652732990-1207947948
                                                          • Opcode ID: b4dbf27519c57c1e72fabdcd2eb2ec9bec78cb3436c5dfe29bb09ff950f95ec2
                                                          • Instruction ID: 62686a2b141cdffe96fa4c3ebff38bb471b78075799c64f691a34ae1243e35b2
                                                          • Opcode Fuzzy Hash: b4dbf27519c57c1e72fabdcd2eb2ec9bec78cb3436c5dfe29bb09ff950f95ec2
                                                          • Instruction Fuzzy Hash: 42B1D126E0FEC26AE7658F2498543FA22A4FB44BD8F412131DA1ECB7C5DE7C96418300
                                                          APIs
                                                          Strings
                                                          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00007FF8A931E0D4, 00007FF8A931E31F
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Value
                                                          • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs
                                                          • API String ID: 3702945584-4235933832
                                                          • Opcode ID: 5fe83526eb6cddf82d861b40bd821c798507da5aeaa14f9e4c49249df05c8b3b
                                                          • Instruction ID: 8ac2dcb7de9bc37ea59509a44173c39a380cdebb6e4a34d1f86b9043c339d75b
                                                          • Opcode Fuzzy Hash: 5fe83526eb6cddf82d861b40bd821c798507da5aeaa14f9e4c49249df05c8b3b
                                                          • Instruction Fuzzy Hash: E1220222B0EAD1A6EB248F2595007B867B1EF44BE4F54A635DE1D877E4EF3D9941C300
                                                          APIs
                                                          Strings
                                                          • assertion failed: self.is_char_boundary(new_len)/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\alloc\src\string.rs, xrefs: 00007FF8A9320097
                                                          • NTDLL.DLL, xrefs: 00007FF8A931FCBC
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessagememset
                                                          • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\alloc\src\string.rs
                                                          • API String ID: 3213201652-1160814674
                                                          • Opcode ID: 3960721bc8a1e007fb2ddf49eec8f961cbc5ab57f16a9b78a2fde4689177bfff
                                                          • Instruction ID: 231d7c2ecf89f7d03f806301bd123194048f1d41f86fa0e1a7a8ad0889ee484d
                                                          • Opcode Fuzzy Hash: 3960721bc8a1e007fb2ddf49eec8f961cbc5ab57f16a9b78a2fde4689177bfff
                                                          • Instruction Fuzzy Hash: CFC18E22A0EED2A4FB758F21D8007FC26B1EB457C4F54A135DA4D86BE9EF7CA6459300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heap$AllocFree
                                                          • String ID:
                                                          • API String ID: 1379380650-0
                                                          • Opcode ID: b5e8c2bd7d64487019ea57f0d6a4cbf120b4ff4e9bd64e8b98161bc81e34be2f
                                                          • Instruction ID: 0a158de7802b3c96bb383675ff619ad81cdfd59da5cf805557c35a570d1cb3a0
                                                          • Opcode Fuzzy Hash: b5e8c2bd7d64487019ea57f0d6a4cbf120b4ff4e9bd64e8b98161bc81e34be2f
                                                          • Instruction Fuzzy Hash: 8E91E462E0EED2A0EE149F2694053B912B1FF89BE5F56A631DD2E873D1DE3CA441C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: e482d034b548d87bad6a82a4cf6e0bbe39d7589f556d2251f85782997d42bc3f
                                                          • Instruction ID: 5f5d05473a2798e84e2abb8f4e8b8308cacefa7028afec9db6c636e84444c3fb
                                                          • Opcode Fuzzy Hash: e482d034b548d87bad6a82a4cf6e0bbe39d7589f556d2251f85782997d42bc3f
                                                          • Instruction Fuzzy Hash: 15916D22E0EFC2A4F7648F2188543F927B1EB597C8F54A076DA5D87A89CF3DA944D340
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcmp
                                                          • String ID: ,(><&*@$.llvm./rust/deps\rustc-demangle-0.1.24\src/lib.rs$::_$$SizeLimitExhausted$__ZN$`fmt::Error`s should be impossible without a `fmt::Formatter`$called `Result::unwrap()` on an `Err` value
                                                          • API String ID: 1475443563-3519419861
                                                          • Opcode ID: a6de1efbbb16900b6ad75f113feea97af4d722feec8099256361e3ccac9fff69
                                                          • Instruction ID: 5036660a61507501366503e8b1e6c5c5848be9d93cd78cfe9595e8fdff137009
                                                          • Opcode Fuzzy Hash: a6de1efbbb16900b6ad75f113feea97af4d722feec8099256361e3ccac9fff69
                                                          • Instruction Fuzzy Hash: CFE23222E1EEE261FF248E1594046BDAB72EB457C4F646131DA1E8B6E4EFBCD941C304
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 39ea998cab3b8e9a6f1b09ffa4bcc5159b74de121971418e2a7a6988c1585840
                                                          • Instruction ID: 507660ec576892ae36a2eac2ac09a2cf7198444ee234a92169afd44843cdfc40
                                                          • Opcode Fuzzy Hash: 39ea998cab3b8e9a6f1b09ffa4bcc5159b74de121971418e2a7a6988c1585840
                                                          • Instruction Fuzzy Hash: BBC1A022A0EFC295F7258F2198403FA36B1FB647D8F54A136CA1E9BAD4CF399645D340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heapmemcpy$Free$Process
                                                          • String ID:
                                                          • API String ID: 2743480619-0
                                                          • Opcode ID: 36c53ef5deb7f32668853e252c9624e1f49ae9a9ad4dd2d022b969e742445ee2
                                                          • Instruction ID: b9530b911be39cf129a5006ee7d0ced71380df421b3d2ee92bd78a295b93b8f2
                                                          • Opcode Fuzzy Hash: 36c53ef5deb7f32668853e252c9624e1f49ae9a9ad4dd2d022b969e742445ee2
                                                          • Instruction Fuzzy Hash: DDA17E62A0AFC1A6E7488F26A8053BD67B4FB197C4F44953ADE5D97785DF38E4A08300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: e5685fac8d32ad2dc86b07b3dfe0dd3756730bb3d35cf67d305f6ae32ee370d2
                                                          • Instruction ID: eb34ace778ec693619fe4fe0826961ed225de66f6c1e6b048d7f899ca49f1081
                                                          • Opcode Fuzzy Hash: e5685fac8d32ad2dc86b07b3dfe0dd3756730bb3d35cf67d305f6ae32ee370d2
                                                          • Instruction Fuzzy Hash: FC815A32A0EFC2A4E7258F2198543F937B1FB597C8F44A176DA4D8BA88CF399644D340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 2c3b31dd58b10a5e66037e4bb143dae89b57d3c976c48a3b6ddf84641229c8b4
                                                          • Instruction ID: 2acc5f11317bc84ce36359cf841ec71e3a0d9872c7f7147b1fd4173db1cc1cd2
                                                          • Opcode Fuzzy Hash: 2c3b31dd58b10a5e66037e4bb143dae89b57d3c976c48a3b6ddf84641229c8b4
                                                          • Instruction Fuzzy Hash: C0814932A0EFC2A4E7258F2198543F937B1FB597C8F44A176DA5D8BA88CF399644D340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 383fcb2ae74fb274de0dcbbaa5cbd9025323f7c2d2d5c1ac30af36d000b06b73
                                                          • Instruction ID: e8baa1cb59322074ef9a73c5b78c8da8a5c7b84909a57351a3890f874bad3bb7
                                                          • Opcode Fuzzy Hash: 383fcb2ae74fb274de0dcbbaa5cbd9025323f7c2d2d5c1ac30af36d000b06b73
                                                          • Instruction Fuzzy Hash: 8B815932A0EFC2A4E7258F2198543F937B1FB597C8F44A176DA4D8BA88CF399644D340
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6881156b941a4b653a04b0bbc4b60715dd53e91fce343bc0abba9b9a9a02d985
                                                          • Instruction ID: 131089a503efaa0cac125ec65ef9ba9f4fa4a8974ddca2650db9f487c2eefb40
                                                          • Opcode Fuzzy Hash: 6881156b941a4b653a04b0bbc4b60715dd53e91fce343bc0abba9b9a9a02d985
                                                          • Instruction Fuzzy Hash: DA717C21A0EFC2A4F7258F2198443F933B1FB597C8F44A076DA0D9BA98CF39A941D340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 19fd1df5ada753cdaa2c7dbcda36aec0e60f662245c823ec9045183f89d2ad58
                                                          • Instruction ID: f46c2d39f8ad520883fb8e2c295bf33821d86366913115eb4e232f9ec4142972
                                                          • Opcode Fuzzy Hash: 19fd1df5ada753cdaa2c7dbcda36aec0e60f662245c823ec9045183f89d2ad58
                                                          • Instruction Fuzzy Hash: 8C614A22A0EFC2A4E7248F2188543F937B1FB597C8F44A176CA4D9BA98CF399544D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 9c1e004fae9f0bf5966eaec1e847d22e05db450f4cf120411fc52461cb8c593b
                                                          • Instruction ID: 18ce317e8062cb36ee4f44bf2f9caecc53ea8ade7a800fea0db122f53a33dfaa
                                                          • Opcode Fuzzy Hash: 9c1e004fae9f0bf5966eaec1e847d22e05db450f4cf120411fc52461cb8c593b
                                                          • Instruction Fuzzy Hash: 16613821A0EFC2A4FB648F21D8443F936B1EB587C8F04A176CA5D9BB98CF399544D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: ca5d287514c4e2dc6289f90171c34f0bd127cf93183bfc6847886a5853025648
                                                          • Instruction ID: efbbf5e8499c4a7248a3440cee53e869274aa7c46317f4b33d36a49c2af1cf9f
                                                          • Opcode Fuzzy Hash: ca5d287514c4e2dc6289f90171c34f0bd127cf93183bfc6847886a5853025648
                                                          • Instruction Fuzzy Hash: 09511921A0EFC2A4F7648F21C8443F932B1FB597C8F44A176CA5D9BB98CF39A5459341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 6987912418e482f5424e9cf242fdbe8bbf3a4953a296c281d00e5841a4fd2ab1
                                                          • Instruction ID: 7ccb43f735786caa4b566c74ee821485bdbd6ae30db19f078d110a0ae6dafe27
                                                          • Opcode Fuzzy Hash: 6987912418e482f5424e9cf242fdbe8bbf3a4953a296c281d00e5841a4fd2ab1
                                                          • Instruction Fuzzy Hash: 03511821A0EFC2A8F7648F21C8443E933B1FB597C8F44A176CA1D9BB98CF39A5459341
                                                          APIs
                                                            • Part of subcall function 00007FF8A931F2C0: TlsGetValue.KERNEL32(?,?,?,?,00007FF8A934F4AA), ref: 00007FF8A931F2D9
                                                          • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00007FF8A934F91D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: AddressSingleValueWake
                                                          • String ID: Box<dyn Any><unnamed>$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$main
                                                          • API String ID: 741412973-2031151970
                                                          • Opcode ID: 25dc098df5c166b442ebe9e08a1f7d72de5f200c3afe06ff354aab0fda181a1f
                                                          • Instruction ID: aed123f8b5c20f783ed722d10590484823a745ebdefaf91437ade4f9e6e0e576
                                                          • Opcode Fuzzy Hash: 25dc098df5c166b442ebe9e08a1f7d72de5f200c3afe06ff354aab0fda181a1f
                                                          • Instruction Fuzzy Hash: EC227822A0EFD2A9EB108F60D8503BC37B0EB84789F596535DA4D867A5EF3CE545C340
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: assertion failed: end >= start && end <= len
                                                          • API String ID: 0-206846142
                                                          • Opcode ID: b91defc51a6ab7b52e1da2ca7320925c8b4d9b473ecbb69dd3d0b8a8929ed095
                                                          • Instruction ID: 66a1b4b9b0e6626fab0f68d88ecf230eef6fd685ee6580580476ee080cf73acc
                                                          • Opcode Fuzzy Hash: b91defc51a6ab7b52e1da2ca7320925c8b4d9b473ecbb69dd3d0b8a8929ed095
                                                          • Instruction Fuzzy Hash: B9626A72A0AFC5A6E7648F25D8447E927B0F728BC4F549036DA5E8BB88CF38D595C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID: cmd.exe /e:ON /v:OFF /d /c "
                                                          • API String ID: 3298025750-533445247
                                                          • Opcode ID: d027b3fbee4b8429ee97dbd3b56c8aed57f342c0261b5ddc8b33ed153e4f7194
                                                          • Instruction ID: 91a0805d236d0de7d648b876b583a40eb614cae0a4e96d6947dd6e44b7cbc5d3
                                                          • Opcode Fuzzy Hash: d027b3fbee4b8429ee97dbd3b56c8aed57f342c0261b5ddc8b33ed153e4f7194
                                                          • Instruction Fuzzy Hash: 3342E262F1EDA1A4FF248F62D4106BD2B70FB947CDF466135CE1EA6B99CE38A5419300
                                                          APIs
                                                          • HeapFree.KERNEL32(?,?,?,00007FF8A931AA8B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF8A931AC3C
                                                          • HeapFree.KERNEL32(?,?,?,00007FF8A931AA8B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF8A931AD24
                                                          • HeapFree.KERNEL32(?,?,?,00007FF8A931AA8B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF8A931ADF3
                                                          • HeapFree.KERNEL32(?,?,?,00007FF8A931AA8B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF8A931AE8C
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: e785f8694466640ccbc8b3dea46aeb8a3c172319540ca5d006c9ea6d354e2579
                                                          • Instruction ID: c01ad1a2c46c928f09788a61aed1a8e7f3b2e138695dc43cfcf397c24816ef9a
                                                          • Opcode Fuzzy Hash: e785f8694466640ccbc8b3dea46aeb8a3c172319540ca5d006c9ea6d354e2579
                                                          • Instruction Fuzzy Hash: B1719EA2A0EFC1A2EE558F1194503B966B5FB55BE1F24A532CA1DC77E1EE3CA5808300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpymemset
                                                          • String ID:
                                                          • API String ID: 1297977491-0
                                                          • Opcode ID: a6a53b2942153456a0416578af69a6635fb8fe016562c353e00956de8b0eef41
                                                          • Instruction ID: 768053cd5786aa66d88f8cd8a2570fbf2a103a9e21df194676935bae16532856
                                                          • Opcode Fuzzy Hash: a6a53b2942153456a0416578af69a6635fb8fe016562c353e00956de8b0eef41
                                                          • Instruction Fuzzy Hash: 9A424953A0EBE141DF168B39506417D6F61DBA6BA0B0AD369DEFA533D5EA3CC105C310
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 88ffe88a0397392cae24aef2396902edd7b54e0b97c1db03e01e1204cc263a79
                                                          • Instruction ID: a680ecbde8cc4b7bdbef631c8e7e354a058abc69b7c4b8348f48bd8880eb1542
                                                          • Opcode Fuzzy Hash: 88ffe88a0397392cae24aef2396902edd7b54e0b97c1db03e01e1204cc263a79
                                                          • Instruction Fuzzy Hash: 02E11362E1EE91A1EF258F26950037E66B1FF917CDF06A531DE5E866E0DE7CE4418200
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Authenti$GenuineI$HygonGen
                                                          • API String ID: 0-696657513
                                                          • Opcode ID: cbdd5d58124e4f555779748abe59a30f07d77fc9b7afe3c8bbfd874848072354
                                                          • Instruction ID: aa604f7db39d27c5141b5e9480dca5f1e230168eb9f827c19641fb8c0c2b7a5d
                                                          • Opcode Fuzzy Hash: cbdd5d58124e4f555779748abe59a30f07d77fc9b7afe3c8bbfd874848072354
                                                          • Instruction Fuzzy Hash: 509149A7B25D9106FB5C8995AD36BBA4892B3987C8F08B03DED5F97BC5DC7CC9118200
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Authenti$GenuineI$HygonGen
                                                          • API String ID: 0-696657513
                                                          • Opcode ID: f6c81d16420a9f78b77baa837ac659d92e39546399ca030d17bf482b8cf666a2
                                                          • Instruction ID: 0f7851b84e8e2219fd5c9d9eacb4ffe914fa8d426b34f134dc7f6edf64e21f2b
                                                          • Opcode Fuzzy Hash: f6c81d16420a9f78b77baa837ac659d92e39546399ca030d17bf482b8cf666a2
                                                          • Instruction Fuzzy Hash: 5D9138A7B25D9106FB5C89A5AD36BBA0892B3587C8F08B03DED5F97BC5DC7CC9118240
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memset
                                                          • String ID: punycode{-0
                                                          • API String ID: 2221118986-3751456247
                                                          • Opcode ID: 893e507bd43efc9cc9c57fb6103354fae32e85734b3eda83da799c2ccc7cd5f7
                                                          • Instruction ID: 795c96b81a76894aa9e3cead6561c6c374e312eca58f42aa16a285bd569bda5b
                                                          • Opcode Fuzzy Hash: 893e507bd43efc9cc9c57fb6103354fae32e85734b3eda83da799c2ccc7cd5f7
                                                          • Instruction Fuzzy Hash: 06F1E362B1EAC596EF648F2AD8087F927A2EB487D4F209131CD1D4BBE4EE3DD5418300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memset
                                                          • String ID:
                                                          • API String ID: 2221118986-0
                                                          • Opcode ID: d81c44475a19ba5791806e710b7e777816eb1e1e7972d650a539e079f6a784b2
                                                          • Instruction ID: be6e317ee16a0256505a8e34dbbf43483faacf5d01c5c997c930a048176ea3c7
                                                          • Opcode Fuzzy Hash: d81c44475a19ba5791806e710b7e777816eb1e1e7972d650a539e079f6a784b2
                                                          • Instruction Fuzzy Hash: A9133537A0EAD186D7248F28E0546AEBBB1F784788F554235DBCA93794DB3DE815CB00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeapmemcpy
                                                          • String ID:
                                                          • API String ID: 673829100-0
                                                          • Opcode ID: fea94eadc03ff09373685d8148ce72b79cdd2bb60ea87660c4fc7b15abef1a5c
                                                          • Instruction ID: b538d6e7ae43ff24691b5e59e0f24a6e21c80620cb39a586eab0119e4af3bee3
                                                          • Opcode Fuzzy Hash: fea94eadc03ff09373685d8148ce72b79cdd2bb60ea87660c4fc7b15abef1a5c
                                                          • Instruction Fuzzy Hash: BE61F552A0EED1A9FB108E6584413FE1B60EB247D8F44A934DE0E8B7C6DE3CD1889350
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID: @
                                                          • API String ID: 0-2766056989
                                                          • Opcode ID: 82f163e4761bd8698f5f866852cd4e0229762b1cc4392098708726b2277ebcfa
                                                          • Instruction ID: 03e492f1f0be96a1361e2d69612de1f35194d262457e22f65498985860e29a80
                                                          • Opcode Fuzzy Hash: 82f163e4761bd8698f5f866852cd4e0229762b1cc4392098708726b2277ebcfa
                                                          • Instruction Fuzzy Hash: A1729331618B488BDFA9DF28C8857AA73E1FB98314F54462DD98BC7246DF34E542CB81
                                                          Strings
                                                          • .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo., xrefs: 00007FF8A9323C99
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.
                                                          • API String ID: 0-210007371
                                                          • Opcode ID: 029002b0872862fefe9719ae94c9da13ee695207b1f64218b6a8122cf48e6c4e
                                                          • Instruction ID: 6addc1888cb80832cbc8dcd180ea3961a66d3dfbce1b6a65cf0ca3365376fc5a
                                                          • Opcode Fuzzy Hash: 029002b0872862fefe9719ae94c9da13ee695207b1f64218b6a8122cf48e6c4e
                                                          • Instruction Fuzzy Hash: 7B621762B0EED595EB258F2599047F86760FB24BD8F469231CF6E67785EF38A184C300
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: assertion failed: offset != 0 && offset <= len
                                                          • API String ID: 0-3868694986
                                                          • Opcode ID: fc82270816e37a24e8600c134183b93b69469625b4b44c52c60623a22e056b2f
                                                          • Instruction ID: 9b68c8c568d69a1cd70f6688dcecb7e8d318b4891e6d4faf6c5cf2e7a8068649
                                                          • Opcode Fuzzy Hash: fc82270816e37a24e8600c134183b93b69469625b4b44c52c60623a22e056b2f
                                                          • Instruction Fuzzy Hash: A5825A32609FC599E7648F25D8447EA37B4F708BD8F50A12ADA5D8BB98DF38D691C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memset
                                                          • String ID:
                                                          • API String ID: 2221118986-0
                                                          • Opcode ID: 14ba09119254a79aac693d594f95a58e781b69148d3a3974880bb117a83d521c
                                                          • Instruction ID: 1525f6873033da9e1c7ecdb97c12a91af6f218cacdee7f81a2b119763e08603f
                                                          • Opcode Fuzzy Hash: 14ba09119254a79aac693d594f95a58e781b69148d3a3974880bb117a83d521c
                                                          • Instruction Fuzzy Hash: 30622272B1EAC197EB248F18D4446BAB7A1FB987C4F459235DB0993B84DF3DE9058B00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: assertion failed: offset != 0 && offset <= len
                                                          • API String ID: 0-3868694986
                                                          • Opcode ID: 9b7d7e6261e871f7acdda3337dc0793cc68cfd2c0e16093e62050b4d6ce134c0
                                                          • Instruction ID: 517519b5a594bdcc79162cc9108c6b1be9342b9c76f888818bd94cbbe03957a3
                                                          • Opcode Fuzzy Hash: 9b7d7e6261e871f7acdda3337dc0793cc68cfd2c0e16093e62050b4d6ce134c0
                                                          • Instruction Fuzzy Hash: E902F262E4DEC562FA158F54E5051FA7332EB64BC8F44A631CE5E93791EF2CA685C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcmp
                                                          • String ID:
                                                          • API String ID: 1475443563-0
                                                          • Opcode ID: 74dd6c494fcb9b2839005b4ad277bfc45a9d454dac80b88301c9db28ca6d3208
                                                          • Instruction ID: 433661335c00591a1feeb8f47daa41b7667996b094c70adaeb3b78c7584d60fc
                                                          • Opcode Fuzzy Hash: 74dd6c494fcb9b2839005b4ad277bfc45a9d454dac80b88301c9db28ca6d3208
                                                          • Instruction Fuzzy Hash: 66C11662B1EBE562FA54CEA19814BBA66E5F700BD4F40A5B0DD2E83BC0CF3CE5519300
                                                          Strings
                                                          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00007FF8A930D9E6, 00007FF8A930DC21
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs
                                                          • API String ID: 0-4235933832
                                                          • Opcode ID: 4e06a977fbf9b96e3a59d2d40dc87019d3499e67476bdb34b55511c747bd1b2b
                                                          • Instruction ID: fd4aa69c8ab3c9398463022e6eed97ab366c06a8e9645758d50fb49ef2c4a3b8
                                                          • Opcode Fuzzy Hash: 4e06a977fbf9b96e3a59d2d40dc87019d3499e67476bdb34b55511c747bd1b2b
                                                          • Instruction Fuzzy Hash: 16D12372B1DB9192EB208F59E0007A96BF1FB947D4F906235DAAE87BE4DA3CC541C700
                                                          Strings
                                                          • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00007FF8A931DC49, 00007FF8A931DD55, 00007FF8A931DDF0
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs
                                                          • API String ID: 0-4235933832
                                                          • Opcode ID: d2a53728b6ba352af54ea60689c1565f2431fc3356c7a030aebb1cadf41539e0
                                                          • Instruction ID: 6727d92c22ba7a464ed01165257e13fbc8450caf120b9178331629ae362b2794
                                                          • Opcode Fuzzy Hash: d2a53728b6ba352af54ea60689c1565f2431fc3356c7a030aebb1cadf41539e0
                                                          • Instruction Fuzzy Hash: C4A12762B0DAD155EB208F29D0007B86771EB667E4F906331DBBE87BE5DA3D9605C301
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID:
                                                          • API String ID: 3510742995-0
                                                          • Opcode ID: b35705b82ebd302b43ea39ff4b2c0997ad7702e75a0b2371ae5de3245c21d6e5
                                                          • Instruction ID: 49eee9778535b47f50bbf2826b66d03fbc15589cc5c18bc21cb7256034698061
                                                          • Opcode Fuzzy Hash: b35705b82ebd302b43ea39ff4b2c0997ad7702e75a0b2371ae5de3245c21d6e5
                                                          • Instruction Fuzzy Hash: F381C062F0EAA1A6FB50CF6198043BD2671FF847C8F529535DE1E93785EF38A9818304
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5dc0673226893604a71a31a118a064639cbe924e0cf5e86571a392e00cba467a
                                                          • Instruction ID: 32db24cf6427097e6e95dae4f35dedd665298d1635247d138a28ab1264e8ef9f
                                                          • Opcode Fuzzy Hash: 5dc0673226893604a71a31a118a064639cbe924e0cf5e86571a392e00cba467a
                                                          • Instruction Fuzzy Hash: BB81B163B0EED5A5EE518F60C4105B927B0FB05BD4FA5A532DE6D837A0EF38E9958200
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0123456789abcdef
                                                          • API String ID: 0-1757737011
                                                          • Opcode ID: ee398ae0af3f1eb467bff0aa26ff793cc6fd9e0476b6e486af866dd9f14fb90b
                                                          • Instruction ID: 12009a62c754b8f96378ede8ead925e77006e52a0c66fa8bad44cd3623b7feef
                                                          • Opcode Fuzzy Hash: ee398ae0af3f1eb467bff0aa26ff793cc6fd9e0476b6e486af866dd9f14fb90b
                                                          • Instruction Fuzzy Hash: E7613592E0EED069E3188E6884502BE3AF1E715784F04993DEE6F57795CA3CD505E310
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0123456789abcdef
                                                          • API String ID: 0-1757737011
                                                          • Opcode ID: 738b7bcf3c5c96e1df0669978c6a6781dd5dd2607d69cdac85a126c222d5d7e1
                                                          • Instruction ID: 51503822d15235f1971f0853cc2f5a77716acb3600ef5f40100915774574dceb
                                                          • Opcode Fuzzy Hash: 738b7bcf3c5c96e1df0669978c6a6781dd5dd2607d69cdac85a126c222d5d7e1
                                                          • Instruction Fuzzy Hash: 8B515913B2EEE09AE3118B7884006AC3F72DBD6748F08D0E5CB895BB9AC97DC105D711
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Invalid checksum
                                                          • API String ID: 0-2521479841
                                                          • Opcode ID: 9d68a5b01d58a1c74c7cb6f6e398fce270ee32bb74a30515b8744937828c481c
                                                          • Instruction ID: 96cc2c0303d43e263b17a18dedc4fc1b012cecbf9ea3e331521a252ac45fd385
                                                          • Opcode Fuzzy Hash: 9d68a5b01d58a1c74c7cb6f6e398fce270ee32bb74a30515b8744937828c481c
                                                          • Instruction Fuzzy Hash: EB41F372A1EAC2AAEB648F10A8407B97771EB587D0F94E031DB8DC3651DF2CE5858300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: f830e609fe5cee47e6c16999e452ce305c1c12be961c10b305ce6362bf0b176d
                                                          • Instruction ID: 332143e9f0274de802009ba5887aed68987e9fdf1cdeb20fb8ddce8132df33c0
                                                          • Opcode Fuzzy Hash: f830e609fe5cee47e6c16999e452ce305c1c12be961c10b305ce6362bf0b176d
                                                          • Instruction Fuzzy Hash: 4F428871608381AFDBA4CF28C884B6BBBE9BF88714F14496DFA859B341D730E855CB51
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2cbbf61adc9766ab06f620da19617610e020b7619ca8c4534f07695108860661
                                                          • Instruction ID: 4a66d035b170c0f255b0f8285893c32df082ca2f15def45c0600a078a3398ee8
                                                          • Opcode Fuzzy Hash: 2cbbf61adc9766ab06f620da19617610e020b7619ca8c4534f07695108860661
                                                          • Instruction Fuzzy Hash: 3D627DB391D6819BE3648F25C14036EBBB0F785B98F259239CB4987B48CB79E851DF40
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 09b83806e05523c94b193beb7f49ba70408051c34eda2f1dd708b59c489c014d
                                                          • Instruction ID: 2a3e23191e7791acfd8792ed6e36b2ca7cca001fabcdcca7338cfad5b22cf8c8
                                                          • Opcode Fuzzy Hash: 09b83806e05523c94b193beb7f49ba70408051c34eda2f1dd708b59c489c014d
                                                          • Instruction Fuzzy Hash: 0442787AB19B919AEB14CFA8E4402AE37B0F744788F10592EDE5E9BB94CFB4D145C340
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 54a19d4bb2a1054924f4bfc2abc68d4f449b9e1de2d679b882cf74b481fb4666
                                                          • Instruction ID: 20de6ff96d85481c15956ab4ffac6cdd0c32667aa35a0039988cc82b5f6a6be6
                                                          • Opcode Fuzzy Hash: 54a19d4bb2a1054924f4bfc2abc68d4f449b9e1de2d679b882cf74b481fb4666
                                                          • Instruction Fuzzy Hash: 29D19430719B498BDF68DF6898897AEB7E5FB58715F00422EE85BC7240DF30E5128B81
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 19b379eb95eddf4a739ffdec58de01ed55cc592d459a0fb3cf5a239a4da12b32
                                                          • Instruction ID: 811836921858ec7777b50239a237c98f0616f68985397eae4347ce7e55205c1e
                                                          • Opcode Fuzzy Hash: 19b379eb95eddf4a739ffdec58de01ed55cc592d459a0fb3cf5a239a4da12b32
                                                          • Instruction Fuzzy Hash: 2BF1E572A1DB8186D721CE14A44076AF7A1FB957C9F159335DF8DA3B44DB3DE8418B00
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8f621c93dee6c75bf794f4e9bf10a488de4abb7c11026712c06788c533fcff2d
                                                          • Instruction ID: 15b61625f987e72fe949dd76274465c6c5181ba1a435d926a8e5803fd6b2343d
                                                          • Opcode Fuzzy Hash: 8f621c93dee6c75bf794f4e9bf10a488de4abb7c11026712c06788c533fcff2d
                                                          • Instruction Fuzzy Hash: B4C15C92D0EED664F7718EE4968077A6AB2D7327E1F54B230CB6E932D1CE7C99458300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 62d7fda05aa5002f310405410d87200e77d0c13500d4daf0d15252da8c444966
                                                          • Instruction ID: 7e5f7386a9a6123894c54db403591910cfaa517aa4bfd9aefa566433b1ea3af5
                                                          • Opcode Fuzzy Hash: 62d7fda05aa5002f310405410d87200e77d0c13500d4daf0d15252da8c444966
                                                          • Instruction Fuzzy Hash: 7AE17E77A1DAC59AE7648F29C04476EBBB1FB84B88F149175DB0987798CF38E845CB00
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5cabdd7db65639e64826cc91f615f0f1705bee77b54f99ab1b21d4b7534ab303
                                                          • Instruction ID: 8301d8068def6f3ab990fb76bae5e7692b1c24599485c184a8a6b5b1d3a76bb1
                                                          • Opcode Fuzzy Hash: 5cabdd7db65639e64826cc91f615f0f1705bee77b54f99ab1b21d4b7534ab303
                                                          • Instruction Fuzzy Hash: C6E17A66E29FC556F323573864032B5E718AFFB2C9E40E31AFDD4B0D23EB6482529644
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 067649223c953f9525c2a410a9a8de33b233618c428a583215ad72e4834a7444
                                                          • Instruction ID: e3fa09825d4f0f432bcf232276e140e53e154d5d0e32bf419efb56302668f0fc
                                                          • Opcode Fuzzy Hash: 067649223c953f9525c2a410a9a8de33b233618c428a583215ad72e4834a7444
                                                          • Instruction Fuzzy Hash: A5B14B26A0EFD5A4FB648F6096403FD67B2EF217C8F44A131DE4D82595DE3CA186C300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3245193500.00000000026E0000.00000040.00000020.00020000.00000000.sdmp, Offset: 026E0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_26e0000_regsvr32.jbxd
                                                          Yara matches
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2464d5d1c8744b7938e622091fc8299d1c098dc56941e33080af8fbc6eb05a52
                                                          • Instruction ID: 4cf45a9586cc7aa7ba65fa6e54288608c808653a48ea8ecf5cc089ffd1b31597
                                                          • Opcode Fuzzy Hash: 2464d5d1c8744b7938e622091fc8299d1c098dc56941e33080af8fbc6eb05a52
                                                          • Instruction Fuzzy Hash: 17A13031608A4C8FDB55EF28C889BEA77F5FB68315F10466EE84AC7165EB30D644CB81
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 86622737fe52af6c211b92eb3b40a167755c2b2f86006756955474b673b19b9e
                                                          • Instruction ID: b68b45cbc0d8e393f89cd443a978e8aae0aa1f06cc5841ad2dc0320fb811a687
                                                          • Opcode Fuzzy Hash: 86622737fe52af6c211b92eb3b40a167755c2b2f86006756955474b673b19b9e
                                                          • Instruction Fuzzy Hash: FE918892E2EFE612E623477939016A596109F537E4E44E332FD7DB1BE4DB2DA6438200
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 062a11befc27f384af5af2a6cac435f1dc16abea98564fc87c628cacea8b601f
                                                          • Instruction ID: bdd9fe67257967c79757946e64ca1059e64cc09afeba700e3ef3d2afa53ebef2
                                                          • Opcode Fuzzy Hash: 062a11befc27f384af5af2a6cac435f1dc16abea98564fc87c628cacea8b601f
                                                          • Instruction Fuzzy Hash: 1DA13466B1EBD191E7208F2589047AEBEB0F700BD9F216125CE5D23780DBB9C952C300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 3c79be9426116689442e0620c5e171a21f1165538b67e0dc750b65a7c7a05056
                                                          • Instruction ID: d7addecca2d5a2bd3d4f94386efdd0256cb4718035b58b70ddc6d09918282ddd
                                                          • Opcode Fuzzy Hash: 3c79be9426116689442e0620c5e171a21f1165538b67e0dc750b65a7c7a05056
                                                          • Instruction Fuzzy Hash: 1991D533619AD182D7618F2999002AAB7A1FB897E4F14A331EF9C47BD8DB3CD155C700
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: b4330e56959ee462ed1205fda9ac7683176cd5f26063ffa8ef68a2c8a5f0f074
                                                          • Instruction ID: d88e15fcd76a24c1b6f90b77ed0c3ee5c3a9da69b404487fe1aa803d50ef2f5b
                                                          • Opcode Fuzzy Hash: b4330e56959ee462ed1205fda9ac7683176cd5f26063ffa8ef68a2c8a5f0f074
                                                          • Instruction Fuzzy Hash: 84412772F49AA552FF58CF91E564A787721E390FD0F11A032CD1AA3B94DE38D996C380
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 90f2252cabe335833bc4814939a045e21dcde5a3641b26c1206611196aeeab64
                                                          • Instruction ID: a71ec448c601bf4f953dd63b4d84dd4571f17a09791c8f3340ac6f783db1d9c7
                                                          • Opcode Fuzzy Hash: 90f2252cabe335833bc4814939a045e21dcde5a3641b26c1206611196aeeab64
                                                          • Instruction Fuzzy Hash: A2314D27B0F6C15FE6218E14B84067A7270EB897E4F942132DE4D83B91DE3DF8819700
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5516306428a42fe254c93f58bbeef348cd662d36b8fdb16bde27e9aed139195d
                                                          • Instruction ID: be0aed9a43fe67a2bdb263056340d199d1dafd3ccc5023dc4d933ed173b61b71
                                                          • Opcode Fuzzy Hash: 5516306428a42fe254c93f58bbeef348cd662d36b8fdb16bde27e9aed139195d
                                                          • Instruction Fuzzy Hash: 8A31A9D6B08FC042FE54E7A8746737B9321A7857D0F40F236DE899660ADF2ED1428644
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast$EnvironmentVariable
                                                          • String ID: at :$<unknown>
                                                          • API String ID: 3632352037-3657909574
                                                          • Opcode ID: c0cba90687a0b6fb0a506ff88ba1c6853a0cbbaa6b96057d2cc2ba2423f696e2
                                                          • Instruction ID: 5b17cf1cfc9d2ed84474b23bf1ae5c7469621fc82256228d3ceb33092455f07d
                                                          • Opcode Fuzzy Hash: c0cba90687a0b6fb0a506ff88ba1c6853a0cbbaa6b96057d2cc2ba2423f696e2
                                                          • Instruction Fuzzy Hash: 61423532A09FC1A9EB218F64E8443E937B0FB44798F105129DE8C97B99DF79D689C340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaiseUnwindabort
                                                          • String ID: CCG $CCG $CCG!$CCG!$CCG"
                                                          • API String ID: 4140830120-3297834124
                                                          • Opcode ID: 51e58efd0602fbf0329e585e272b66322d8febf7f876c3ec7abdec5a1400d3de
                                                          • Instruction ID: faa99359f3e7e9751e3556b4fb717568b079ee2ae62053192d631b0eed75f9e0
                                                          • Opcode Fuzzy Hash: 51e58efd0602fbf0329e585e272b66322d8febf7f876c3ec7abdec5a1400d3de
                                                          • Instruction Fuzzy Hash: E5519C23A19F81D6E7608F15E4446AE73B0F79DB88F50A226EE8D53758DF38D582C740
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFileHandleSleep$ErrorLastReadWritememset
                                                          • String ID:
                                                          • API String ID: 78123985-0
                                                          • Opcode ID: 3b70d7676385697138e4f339739b61284edf89d1cd90e3dde29c634039625ffd
                                                          • Instruction ID: 6a0fad00c01d91ff10cffc149a8283510fd84e7676015668be66c19e042b2f87
                                                          • Opcode Fuzzy Hash: 3b70d7676385697138e4f339739b61284edf89d1cd90e3dde29c634039625ffd
                                                          • Instruction Fuzzy Hash: 5461B322A0EAC2A9E7319F2498017F937B0FF487C9F016135DE6D8BBD9CE7C95858200
                                                          APIs
                                                          Strings
                                                          • assertion failed: match track_edge_idx { LeftOrRight::Left(idx) => idx <= old_left_len, LeftOrRight::Right(idx) => idx <= right_len,}, xrefs: 00007FF8A934575B
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy
                                                          • String ID: assertion failed: match track_edge_idx { LeftOrRight::Left(idx) => idx <= old_left_len, LeftOrRight::Right(idx) => idx <= right_len,}
                                                          • API String ID: 3510742995-2944714439
                                                          • Opcode ID: 2a2634104855de7466556e4501512c01c0642b6f57403e7fb8a3c4c2d2589a8e
                                                          • Instruction ID: 93ba693d67a1ec0467b33210056725045cb1e90782d9ade4a8660874523784f5
                                                          • Opcode Fuzzy Hash: 2a2634104855de7466556e4501512c01c0642b6f57403e7fb8a3c4c2d2589a8e
                                                          • Instruction Fuzzy Hash: 2C329E32A0AFC195EB61CF24E8403E933B8FB58B88F559236DA8D9B754DF759295C300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: QueryVirtual
                                                          • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                                                          • API String ID: 1804819252-1534286854
                                                          • Opcode ID: d4e75093067c1eef3902b7eb05e438d85f7609e9ddf453cf1685e48223be1664
                                                          • Instruction ID: 58b3cc7389ade399d40882b48d0b8fe36ec969234192393858fb21d56b81ee54
                                                          • Opcode Fuzzy Hash: d4e75093067c1eef3902b7eb05e438d85f7609e9ddf453cf1685e48223be1664
                                                          • Instruction Fuzzy Hash: 5F41BE76A0EE82A6EA148F15E4446BA77B0FF89BD4F45A130DA0D87395EE3CE941C740
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy$FreeHeap
                                                          • String ID: assertion failed: new_left_len <= CAPACITY
                                                          • API String ID: 4250714341-3316943531
                                                          • Opcode ID: 981a323b5dbb870e5094f0ba1386b4e06bf3b5df5200e711a49cfbd547ee44bf
                                                          • Instruction ID: d4919644a18bf702d24191d856f3585a621f418b8f0fee3c066f0004bdb18ae9
                                                          • Opcode Fuzzy Hash: 981a323b5dbb870e5094f0ba1386b4e06bf3b5df5200e711a49cfbd547ee44bf
                                                          • Instruction Fuzzy Hash: 0FB17026A15BC4A2EB158F18E4443EA77B4FB58B98F45A232DF4D53751EF38E2A5C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy$FreeHeap
                                                          • String ID:
                                                          • API String ID: 4250714341-0
                                                          • Opcode ID: c31fd265c22ceb8bb203fa1bea40bcd9ba954b131313a70eb03dff8f5241d088
                                                          • Instruction ID: 5d425d27201130f40f5ca7c84c70bee7a2f4ee6a33f522b4110791c15bfae6f1
                                                          • Opcode Fuzzy Hash: c31fd265c22ceb8bb203fa1bea40bcd9ba954b131313a70eb03dff8f5241d088
                                                          • Instruction Fuzzy Hash: ACF19B62A09FD4A5E7059F68E8053F963B4FF48B88F44A221DE8D93765EF38E595C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 77e2560cebb3281c44c0f2bfa28cf23f69536c80be2580c9db214884d05b71aa
                                                          • Instruction ID: 9ffdbc09a75033eaab86ac3fc6178b60f748ba7bc5df0558b77a4d9202c71c8c
                                                          • Opcode Fuzzy Hash: 77e2560cebb3281c44c0f2bfa28cf23f69536c80be2580c9db214884d05b71aa
                                                          • Instruction Fuzzy Hash: 4B41EA2190EEC2A0F664EF52A4583FA6271FFC87C4F446076D94ECA69ACF7EE044D601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FreeHeap$FileModuleName
                                                          • String ID:
                                                          • API String ID: 526635459-0
                                                          • Opcode ID: 234034aac4a69ad57cd7017add9877d52c49750f1771cf30c797ff67527a0711
                                                          • Instruction ID: bfc10b45f4256f7aa017702f248fdfc064ded8ee2783cb5aa3f976ab78f466e7
                                                          • Opcode Fuzzy Hash: 234034aac4a69ad57cd7017add9877d52c49750f1771cf30c797ff67527a0711
                                                          • Instruction Fuzzy Hash: A3517211A4EFC1AAE7659F62A8043FA22B4FB05BD8F006139ED2DD7785DE7CE2418300
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 38c31e509f00780f06ca036e12a6af17234d9f74ca5995cf672fadfd354d7a1c
                                                          • Instruction ID: 163f14eb9d48b95546bfe4ae22daa1cabc67168701a49e4d9424581016f56606
                                                          • Opcode Fuzzy Hash: 38c31e509f00780f06ca036e12a6af17234d9f74ca5995cf672fadfd354d7a1c
                                                          • Instruction Fuzzy Hash: A151AE22A0EB81A9F7259F65E8453E977B0FB583D8F14A134EE8D46B85EF3CD1858340
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: abort$CaptureContextExceptionRaiseUnwind
                                                          • String ID: CCG
                                                          • API String ID: 4122134289-1584390748
                                                          • Opcode ID: d5e575fdb48f0d82c3a8ee070d6bbe93577a3e9dd477f38d468f4dc00e201611
                                                          • Instruction ID: 96d4ba0212794da17575913c5dfc609c54c40060118f127af0309dcda57f4a1e
                                                          • Opcode Fuzzy Hash: d5e575fdb48f0d82c3a8ee070d6bbe93577a3e9dd477f38d468f4dc00e201611
                                                          • Instruction Fuzzy Hash: 90317E72A09FC586E7209F24E4403AA7771FBDD788F50A226DA8C53769DF79C1A1CB00
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 18f78f09db2722250bfa24791444786fa6145ec8145da0be69ee11e8bbfcefbb
                                                          • Instruction ID: 5a7f17b9542b7e8ebdb034be118b345bb85523d50c11eeb69dc93013f0226eb8
                                                          • Opcode Fuzzy Hash: 18f78f09db2722250bfa24791444786fa6145ec8145da0be69ee11e8bbfcefbb
                                                          • Instruction Fuzzy Hash: 61516F2290EFC1A9F7659F2998453F923B0FF98798F04A132DE4D87796DF399295C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CaptureCloseContextExceptionHandleRaiseUnwindabort
                                                          • String ID:
                                                          • API String ID: 245745995-0
                                                          • Opcode ID: 1640553c8aa3bcfd908af3890faa38e5c099838c3c12a3070ac1cee0db7ce360
                                                          • Instruction ID: cf7c8c4453003328563a8c46f6d6c7fdfa97d1c411a873547b433bc1385ff686
                                                          • Opcode Fuzzy Hash: 1640553c8aa3bcfd908af3890faa38e5c099838c3c12a3070ac1cee0db7ce360
                                                          • Instruction Fuzzy Hash: 69314F2190EEC2A0E664EF52D4143FA62B1EFC87C4F446071DA4ECBA9ADF7EE4449640
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 8fde4531e1a884be5a99b2484af7e0bfdec3953cf9859f7fb4137282dbee6db8
                                                          • Instruction ID: 638d8a9d72e7e087aacd408299a7e0f859bedf0d5cf8e844e23e6b4c23a30a1a
                                                          • Opcode Fuzzy Hash: 8fde4531e1a884be5a99b2484af7e0bfdec3953cf9859f7fb4137282dbee6db8
                                                          • Instruction Fuzzy Hash: 44313C2190EEC2A0E660EF52D4143FAA2B1EFC87C4F446071DA4DC6AAACF7EE4449640
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 991fef08b79171be20da31557d9542be86fb3f45f7645c607263057c754fd2d0
                                                          • Instruction ID: bdb9cb1b8a6e910ce284deeaf082d00e27fb56e2cd24e6fe9c8083e590372b99
                                                          • Opcode Fuzzy Hash: 991fef08b79171be20da31557d9542be86fb3f45f7645c607263057c754fd2d0
                                                          • Instruction Fuzzy Hash: 3D310C2190EEC2A0F624EF52A4583FA62B1FFC87C4F446076D54ECA69ACF7EE444D601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: b9ac4d9512c90be7035979054ac21f1ec4db44d632d5d3d7e0ef561a44a9ddcb
                                                          • Instruction ID: 016f5f20d285bba0a8329b45b1a1acc2676537849ffda0621296915842744381
                                                          • Opcode Fuzzy Hash: b9ac4d9512c90be7035979054ac21f1ec4db44d632d5d3d7e0ef561a44a9ddcb
                                                          • Instruction Fuzzy Hash: 66310C2190EEC2A0F664EF52A4583FA6271FFC87C4F446076D54ECA69ACF7EE044D601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 96c39fe0d3da3040bbbf1f122159ae1dab2f3696ab783d8f852be5ea89b4b417
                                                          • Instruction ID: c8539c615e4bf8cc4dd76a1ce5abc74ef8c803674f6ecb8f0f91862ee5352742
                                                          • Opcode Fuzzy Hash: 96c39fe0d3da3040bbbf1f122159ae1dab2f3696ab783d8f852be5ea89b4b417
                                                          • Instruction Fuzzy Hash: CC310C2190EEC2A0F624EF52A4583FA62B1EFC87C4F446076D54DCA69ACF7EE044D601
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID: cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$main
                                                          • API String ID: 3298025750-3821718884
                                                          • Opcode ID: 04311f8484996615b80cbe3c8043f456cd4d4e0b65da824b74bd4273dcdf5596
                                                          • Instruction ID: 775e191d7dd28d457e728ec83f4866072342a79f35c28716fddfdb8ccc279d72
                                                          • Opcode Fuzzy Hash: 04311f8484996615b80cbe3c8043f456cd4d4e0b65da824b74bd4273dcdf5596
                                                          • Instruction Fuzzy Hash: A9918B22A0EE82A4EB11DF51E8443B927B1FF847C4F46A436DA6D8A795DF7CE485C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast$FullNamePath
                                                          • String ID:
                                                          • API String ID: 2157454263-0
                                                          • Opcode ID: 3c0c321286fb6f3b9183d93ec9de582e75c11f518bf410b982b40cf503dccaae
                                                          • Instruction ID: ce8150d938864bafe65ed095665081cceb23fc49054d7fdbb9ecac4fa0e68ac4
                                                          • Opcode Fuzzy Hash: 3c0c321286fb6f3b9183d93ec9de582e75c11f518bf410b982b40cf503dccaae
                                                          • Instruction Fuzzy Hash: 6641A421A0EFC199E7359E61D8443FA22A4FB45BD8F116135ED0EDB7C5CE78A2008340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FreeHeap$FullNamePath
                                                          • String ID:
                                                          • API String ID: 554372815-0
                                                          • Opcode ID: 21ae2b1687339e705adfc1e3d21b3004eb0ec5ef78f40e7b44a01ecb5652b0c9
                                                          • Instruction ID: c1be1813442abdaab715267ec72f958f067f57a3ed06ca32ac1d9b27df71d995
                                                          • Opcode Fuzzy Hash: 21ae2b1687339e705adfc1e3d21b3004eb0ec5ef78f40e7b44a01ecb5652b0c9
                                                          • Instruction Fuzzy Hash: 31419221A0EFC1A9EB349F61D8447FA22A4FB49BD8F156135ED0EDB7C5CE79A2408300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 0a2e9717b38cb5d355d1e6921ad268509b2445d4824dd16427ce2c94b82a2909
                                                          • Instruction ID: 918ff06cd1f926f067e23b64bc151500d83feecc04d0bea5dc2ee48e80e637b4
                                                          • Opcode Fuzzy Hash: 0a2e9717b38cb5d355d1e6921ad268509b2445d4824dd16427ce2c94b82a2909
                                                          • Instruction Fuzzy Hash: 04612732A0EEC2A8E7208F21C8543F937B1FB597C8F44A176DA0D9BA88CF399544D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CaptureContextExceptionRaiseUnwindabortmemcpy
                                                          • String ID:
                                                          • API String ID: 2542667021-0
                                                          • Opcode ID: 5952c18b990f1a2a4cb8aa07eb30946ffe44166a3c7b8edb7c525af4b514637a
                                                          • Instruction ID: cb60b6feee94ae5625b43f11fab5a3b4e6621dd15fac5fbe18ee585f993480eb
                                                          • Opcode Fuzzy Hash: 5952c18b990f1a2a4cb8aa07eb30946ffe44166a3c7b8edb7c525af4b514637a
                                                          • Instruction Fuzzy Hash: C9515E2290EEC1A9F725AF2999453F923B0FF987C8F04A131DE4D87796DF399295C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 7699bacceda0390f1bd0ad6422dc3d5ca448318567c24b25e5c4dfbc304e5ba9
                                                          • Instruction ID: fa1cb5db75ca682178d086c179e0b28319edb51408e7feb5cf7513ab573c662e
                                                          • Opcode Fuzzy Hash: 7699bacceda0390f1bd0ad6422dc3d5ca448318567c24b25e5c4dfbc304e5ba9
                                                          • Instruction Fuzzy Hash: F2510922A0EEC2A8E7248F21C4543F937B1FB597C8F44A076DA4D9BA99CF39D544D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 0986f8ff8569904e820052a9b019fedcb6a2ef9f230d48407f13f28fcbab3a4b
                                                          • Instruction ID: 09b3b25fd7f7efba3fadf761f50bdb2fe8b77a9a80e7116b04f3fa1bf67fa399
                                                          • Opcode Fuzzy Hash: 0986f8ff8569904e820052a9b019fedcb6a2ef9f230d48407f13f28fcbab3a4b
                                                          • Instruction Fuzzy Hash: 6151F922A0EEC1A8E7248F21C8543F937B1FB597C8F44A076DA4D9BA99CF39D544D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 63eb14e19864e14ee652e24618796cf0724cb086f3b1e8ff28a84bdd8e437c55
                                                          • Instruction ID: 77e7e089073796c41693e651066187d30eb2b6d5fb2d3d5fa1927710dd18ce25
                                                          • Opcode Fuzzy Hash: 63eb14e19864e14ee652e24618796cf0724cb086f3b1e8ff28a84bdd8e437c55
                                                          • Instruction Fuzzy Hash: DA51F922A0EEC1A8E7248F21C8543F937B1FB597C8F44A076DA4D9BA99CF39D544D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Heap$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 3901518246-0
                                                          • Opcode ID: 5ed5701488604db9c764ec4b2a7e1951054d949c4a2a21d63e9780aac099d0b4
                                                          • Instruction ID: 1b853d50805bb7bf398394ccb2c0ff090a6d9c88ba6228c5bc4b7af0bef15eb0
                                                          • Opcode Fuzzy Hash: 5ed5701488604db9c764ec4b2a7e1951054d949c4a2a21d63e9780aac099d0b4
                                                          • Instruction Fuzzy Hash: B4511832A0EFC1A8F7648F21C8443F937B0EB597C8F04A076CA4D9A699CF79A585D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 2e9a52ca18bec02b22c481d5ca1bd2ddd153f91ff1a5b4f20d3e47ea1b827125
                                                          • Instruction ID: 16da5ec56a468d5ff71be7013eda33ed118d23faed5b9c8f105e0fc19c9b97bc
                                                          • Opcode Fuzzy Hash: 2e9a52ca18bec02b22c481d5ca1bd2ddd153f91ff1a5b4f20d3e47ea1b827125
                                                          • Instruction Fuzzy Hash: 4D518E2290EFC1A9F7259F29D8413F923B0FF98798F04A132DE4D87696DF399295C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 0aa10d7b45793d7c457eb5ce1731c201a058b9d98b1022bc5ae6d7fb2b80b05d
                                                          • Instruction ID: 9bb4f9c3a25de94ad0c88fd1ba95ba41e2e89f40f96de4f209742df5849be851
                                                          • Opcode Fuzzy Hash: 0aa10d7b45793d7c457eb5ce1731c201a058b9d98b1022bc5ae6d7fb2b80b05d
                                                          • Instruction Fuzzy Hash: DD415D21A0EEC6A0FA64AF92D4443FE6271FF897C4F4460B2D94ECA796CF7DE4409201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 2e50c01301b51803ab56fd2a565973fa80ab45543efb3dbfa58ef23b0b9aeda5
                                                          • Instruction ID: 85da8f5ec0df730f8608f09914f5ee7fd0f71d15e30804808d37b6fa678ac157
                                                          • Opcode Fuzzy Hash: 2e50c01301b51803ab56fd2a565973fa80ab45543efb3dbfa58ef23b0b9aeda5
                                                          • Instruction Fuzzy Hash: 41412A2590EEC2A0F664EF91E4543FE6271FF883C4F446076D94EC6A96CF7EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 304b5454b878c1e03bae65f248f81afd71450d8e23e91084cab92b59b036a074
                                                          • Instruction ID: 8d0c1ec581a2b57112ba216f184940d11d5bae0be57bdf931c9a5a9268b7c4fb
                                                          • Opcode Fuzzy Hash: 304b5454b878c1e03bae65f248f81afd71450d8e23e91084cab92b59b036a074
                                                          • Instruction Fuzzy Hash: A4410C2590FEC2A0F664EF91A4543FA6271FF897C4F4460B2D94ECAA96CF7EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 1e38ab8799f5a5df02ed6e2b51670d440cad116fd3ef1fe49e1db53c2ef50988
                                                          • Instruction ID: 8d0c1ec581a2b57112ba216f184940d11d5bae0be57bdf931c9a5a9268b7c4fb
                                                          • Opcode Fuzzy Hash: 1e38ab8799f5a5df02ed6e2b51670d440cad116fd3ef1fe49e1db53c2ef50988
                                                          • Instruction Fuzzy Hash: A4410C2590FEC2A0F664EF91A4543FA6271FF897C4F4460B2D94ECAA96CF7EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 178292386a68b8ec089d2dd31a8c0c2f9bdb03057151cb47c3826666d60be7cf
                                                          • Instruction ID: 1609f4974817f9060e781b887503b36a4cb08e29e469eec98918aa1ad8673af8
                                                          • Opcode Fuzzy Hash: 178292386a68b8ec089d2dd31a8c0c2f9bdb03057151cb47c3826666d60be7cf
                                                          • Instruction Fuzzy Hash: 75312C21D0FDC2A0F664EF9298543FA5271EF887C4F4460B2D94ECAA96CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CaptureContextExceptionRaiseUnwindabort
                                                          • String ID:
                                                          • API String ID: 390735245-0
                                                          • Opcode ID: dec83771c7850586c5774a580664e8509a961e8dc9a0aa6967c86cdc05120f80
                                                          • Instruction ID: 93687527e7afbef18394b1f1c5be6a7186709d6b8577d3fee8b17ffc50ad2627
                                                          • Opcode Fuzzy Hash: dec83771c7850586c5774a580664e8509a961e8dc9a0aa6967c86cdc05120f80
                                                          • Instruction Fuzzy Hash: 26310D2190EEC2A0F624EF56A4543FA62B1EFC87C4F446075D64ECA696CF7EE4449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: c71f0be3b8559fc462b9cf001558c0019377f2d9328ef840efcbb9c35b35ae5d
                                                          • Instruction ID: 512bb1b06bc5df87df83392999464b34d92d07ec00e814f6b3bf59298bf11e63
                                                          • Opcode Fuzzy Hash: c71f0be3b8559fc462b9cf001558c0019377f2d9328ef840efcbb9c35b35ae5d
                                                          • Instruction Fuzzy Hash: A0312C2190EEC2A0F624EF52A4543FA6271EFC87C4F446076D54ECA69ACF7EE0449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 79f5d7ea7e016a49f7a9eac2075096672de05b9fd42a1db46e83678227cd77cd
                                                          • Instruction ID: f77884360f25bc978e580411234362a20b31705c8190520e2a0b8d4f9d0fd798
                                                          • Opcode Fuzzy Hash: 79f5d7ea7e016a49f7a9eac2075096672de05b9fd42a1db46e83678227cd77cd
                                                          • Instruction Fuzzy Hash: 2C31501190EEC2A0F660EF56D4143FAA3B1EFC8BC4F446071D54DC6AAADF7DE4448601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: bc84975b13c6fae6b5ff355b2ec5ccba9f937ebea97734e2cdaeed065c62a359
                                                          • Instruction ID: b9f44a44f5514f8edebc8339607f13a39bd9a205fb2f140d7a9d583c4daff287
                                                          • Opcode Fuzzy Hash: bc84975b13c6fae6b5ff355b2ec5ccba9f937ebea97734e2cdaeed065c62a359
                                                          • Instruction Fuzzy Hash: 63312F2190EEC2A0E664EF56D4543FAA3B1EFC87C4F446071DA4DC6AAADF7DE444C601
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleHeapModuleProc
                                                          • String ID: GetTempPath2W$kernel32
                                                          • API String ID: 2247350619-407914046
                                                          • Opcode ID: 4e62d5408f5826f86271076a09bcfa47aa4c1ea2a890b77d01f21ec99e8ade96
                                                          • Instruction ID: 4370af34600e103481d863b1b24cc6aacb4db3762a160454f8686ec0b11b38f5
                                                          • Opcode Fuzzy Hash: 4e62d5408f5826f86271076a09bcfa47aa4c1ea2a890b77d01f21ec99e8ade96
                                                          • Instruction Fuzzy Hash: 87015A51E4FEC6B9FA149F51A8443F962B1EF88BC0F546439ED1D837959E3CE546C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 1c0cb24cde47dd918f50265b453517ff52207aff264f6ed731c4727e70c657b2
                                                          • Instruction ID: 202481c69e6d3b8590a4f5bdf9af964ac9be63e6fff743603fdb239a625523f0
                                                          • Opcode Fuzzy Hash: 1c0cb24cde47dd918f50265b453517ff52207aff264f6ed731c4727e70c657b2
                                                          • Instruction Fuzzy Hash: CF516D2290EFC1A9F7659F29D9413F923B0FF98798F04A132DE4D87696DF399295C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: b796b53730dd34d750746877530bfa6e18f21d3a974efa5f9ccb9c5342f488ba
                                                          • Instruction ID: 6281302f7240ee73de33bf869ea76ea718f79ae5604c967997288ee0331bcebf
                                                          • Opcode Fuzzy Hash: b796b53730dd34d750746877530bfa6e18f21d3a974efa5f9ccb9c5342f488ba
                                                          • Instruction Fuzzy Hash: A6516E2290EFC1A6F7259F2999413F923B0FF98798F04A132DE4D87695DF399295C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 71f361079f0a37da70f6bf646bb91781f7a86ddf65ab82c83465c0468c63ef4c
                                                          • Instruction ID: 6281302f7240ee73de33bf869ea76ea718f79ae5604c967997288ee0331bcebf
                                                          • Opcode Fuzzy Hash: 71f361079f0a37da70f6bf646bb91781f7a86ddf65ab82c83465c0468c63ef4c
                                                          • Instruction Fuzzy Hash: A6516E2290EFC1A6F7259F2999413F923B0FF98798F04A132DE4D87695DF399295C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: c84b0e6a4ee23237b019b26f46da8c711b34f636d66ab5c784b7a2464c293f19
                                                          • Instruction ID: 404b1abda106f17b992c1c47c3bb6fe650e6aebdcc1091e2180baf43a9000b1c
                                                          • Opcode Fuzzy Hash: c84b0e6a4ee23237b019b26f46da8c711b34f636d66ab5c784b7a2464c293f19
                                                          • Instruction Fuzzy Hash: AF410766E0EEC5A8FB20DF65D8513F822B1EB98788F446036CA4D87799DE3DA545C240
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 0b783f59c1477575a9282130fea674ab105f3219c7dca5074191f58495beccdc
                                                          • Instruction ID: 6343404a386dd1b6324e3a62b74c25c95ea8e7c559379724643b5ea50c81d877
                                                          • Opcode Fuzzy Hash: 0b783f59c1477575a9282130fea674ab105f3219c7dca5074191f58495beccdc
                                                          • Instruction Fuzzy Hash: 40411A66A0EEC5A8FB10DF66D8513F822B1EB98B84F446036CA4D97795DE3DA551C200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$FreeFullHeapNamePath
                                                          • String ID:
                                                          • API String ID: 526175943-0
                                                          • Opcode ID: bfe9382463f47fbf3c34dd180c2b91d01f94d2c838e9508ec10290ac3e5afe7c
                                                          • Instruction ID: 6f067469f76c2c97ce0027f1215ce4c7a6245776a6ffadce2dbf2b68115e598c
                                                          • Opcode Fuzzy Hash: bfe9382463f47fbf3c34dd180c2b91d01f94d2c838e9508ec10290ac3e5afe7c
                                                          • Instruction Fuzzy Hash: 5831C221A0EFC1AAE7319F6198483F926A4FB85BD8F11A131DD5ED77C6CE79D2448300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: b55cb5934011795f104044e862f272562ff2184ef58b8431e0d1ccc53bafabf3
                                                          • Instruction ID: a9f9b7156ffbac018ff01b00fdc3da6ec62d354726d3c444dcd2075bb6e55fcc
                                                          • Opcode Fuzzy Hash: b55cb5934011795f104044e862f272562ff2184ef58b8431e0d1ccc53bafabf3
                                                          • Instruction Fuzzy Hash: 52316E22A1EEC1E8FB649F21D8443FD23B0EF847C9F516076CA0E8B6A5CF38A5458601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: ca458f32a60fe7d35311c7fe61652346aa54bcdbc9a4e07fdcdb7913d33a8d79
                                                          • Instruction ID: 19ef3a3e7a438e40f0d94f1ac3372e5951060b8524639fa981a6b72ab8812951
                                                          • Opcode Fuzzy Hash: ca458f32a60fe7d35311c7fe61652346aa54bcdbc9a4e07fdcdb7913d33a8d79
                                                          • Instruction Fuzzy Hash: 51311C21D0EDC2A0F664EF9194543FE5671EF887C4F4460B2D94ECAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: d1cb7b6d3df844538f43ff9c278c5995e210db7b8da7d1f2d081dfff15eb7a37
                                                          • Instruction ID: ddce48d10610c08fe23cf8faaf587b08c045563e590dc8d69f06d628b307cdd2
                                                          • Opcode Fuzzy Hash: d1cb7b6d3df844538f43ff9c278c5995e210db7b8da7d1f2d081dfff15eb7a37
                                                          • Instruction Fuzzy Hash: 92311E21D0EDC6A0FA64EF9194543FA5271EF887C4F4470B2E94ECAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 96fcb2b2969ba1d409e03a357e763d85d150db9a9edf786b4f7c06afd5022c44
                                                          • Instruction ID: af9cf228da7402e05647e36fead0e206dabf894e11a1da18823f1ab219486d32
                                                          • Opcode Fuzzy Hash: 96fcb2b2969ba1d409e03a357e763d85d150db9a9edf786b4f7c06afd5022c44
                                                          • Instruction Fuzzy Hash: 1631FF21D0EDC2A0F664EF91D4543FE5271EF897C4F4460B2D94ECAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: a051034e064bfb0e781d1cea6ab065c995cd987561e1dc939444c84af77ef740
                                                          • Instruction ID: 4f7329fe3bc3d68e3f92b0dcb16038c11694631f734dc86856c0831c03be0363
                                                          • Opcode Fuzzy Hash: a051034e064bfb0e781d1cea6ab065c995cd987561e1dc939444c84af77ef740
                                                          • Instruction Fuzzy Hash: 9F31FC21D0EDC2A0FA64EF9194543FE6271EF897C4F4460B2D94ECAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: e9213cd35a48a5552a62bf154e5dfc248b01ed4ac6c5cc24c4a33b1afaf8e22c
                                                          • Instruction ID: 946b575e8e1519b45d873b2ead5d159a721521859a5426341908af5ee48dae30
                                                          • Opcode Fuzzy Hash: e9213cd35a48a5552a62bf154e5dfc248b01ed4ac6c5cc24c4a33b1afaf8e22c
                                                          • Instruction Fuzzy Hash: BB311E21D0EDC2A4FA64EF9194543FA5271EF897C4F4470B2D94ECAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CaptureCloseContextExceptionHandleRaiseUnwindabort
                                                          • String ID:
                                                          • API String ID: 245745995-0
                                                          • Opcode ID: 4ecd2aab2c035fdebee44bbd639b7e9e43dcb59622eaf31463b29cdc139c410c
                                                          • Instruction ID: ad2fa8006855c7108d452106e7aaec01c2a92955db413fa0d6cba921bf020cc0
                                                          • Opcode Fuzzy Hash: 4ecd2aab2c035fdebee44bbd639b7e9e43dcb59622eaf31463b29cdc139c410c
                                                          • Instruction Fuzzy Hash: 87313010D0EDC2A0EA24EF96D4553FA5371EFC87C0F446071D64ECA6E6DE7DE4408640
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: a9a824fd2e85c0b7eb43eabc4495df079148a73108f8a60a3244d281df5b7263
                                                          • Instruction ID: 1ee60674d372d9ab9d0a6fe6f072f1c3be9aa6f84d960fd3a3ba1df17f17e962
                                                          • Opcode Fuzzy Hash: a9a824fd2e85c0b7eb43eabc4495df079148a73108f8a60a3244d281df5b7263
                                                          • Instruction Fuzzy Hash: 4C212E21D0EDC2A0FA64EF9294543FE5271EF897C4F4470B2D94ECAADACF6EE0449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 8f7652124dc6a1ff58f7b8a6123205dee40091aa97b7779a65f3d1e6cd823f0f
                                                          • Instruction ID: 4424fe610e217494cea02aad86c904385596bdbcce201b784fb9b4d9bd9057b8
                                                          • Opcode Fuzzy Hash: 8f7652124dc6a1ff58f7b8a6123205dee40091aa97b7779a65f3d1e6cd823f0f
                                                          • Instruction Fuzzy Hash: ED212F21D0EDC2A4FA64EF9194543FE5271EF897C4F4470B2D94DCAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: f82a96a72682d0db7c7ff9fea9b17c50a83e734521e8d6853f983d2ceebc8a55
                                                          • Instruction ID: a1959aa16aea62ed2e59daf8a6506a9135c65af9619d5a2efbfe1184264cea02
                                                          • Opcode Fuzzy Hash: f82a96a72682d0db7c7ff9fea9b17c50a83e734521e8d6853f983d2ceebc8a55
                                                          • Instruction Fuzzy Hash: BA211D11D0EDC2A0FA64EF9294543FE6271EF897C4F4460B2D94ECAADACF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: ebd2416ab2d20f0ec65be0d2a43d430ec7feebd4d2d0409fe4224a42e46aaa51
                                                          • Instruction ID: e165035eb53fad0b8a95c4e1d91eca70ad97f574fb003dace07c14ff1507c222
                                                          • Opcode Fuzzy Hash: ebd2416ab2d20f0ec65be0d2a43d430ec7feebd4d2d0409fe4224a42e46aaa51
                                                          • Instruction Fuzzy Hash: C1212F11D0EEC2A0F624EF5694583FA6671EF887C4F4460B1D54ECAAD6CF7EE444D601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: ff63bde76e835f7a430b9722b3f2cf0b18aff6174d83dea9eefaf501777179ae
                                                          • Instruction ID: b97f01690732b359a875e84012733d11271c69fee2dbd0eaa698f5d651ede070
                                                          • Opcode Fuzzy Hash: ff63bde76e835f7a430b9722b3f2cf0b18aff6174d83dea9eefaf501777179ae
                                                          • Instruction Fuzzy Hash: 5F217111D0EEC2A0F660EF52D4543FA62B1EFC87C4F446071D54DC66AADF7DE0448240
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandleLast$CurrentDuplicateProcess
                                                          • String ID:
                                                          • API String ID: 3697983210-0
                                                          • Opcode ID: 0f7f8291d15367c1020ca9e74800a4d2b37a0a4e878cf3ec27d6883e2ef5c46b
                                                          • Instruction ID: 6bf0c3f14dc4dc601868df3d41576b8e7a9695520bf9bd13a9a91b7855046b93
                                                          • Opcode Fuzzy Hash: 0f7f8291d15367c1020ca9e74800a4d2b37a0a4e878cf3ec27d6883e2ef5c46b
                                                          • Instruction Fuzzy Hash: 7E118222B1FA8299FB609E71A4053BD25A1EB843E8F142235ED6D877C9DF7CD0858300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFileFreeHandleHeapUnmapView
                                                          • String ID: assertion failed: end >= start && end <= len
                                                          • API String ID: 2029649301-206846142
                                                          • Opcode ID: d40968a04be5c3a62ee5e1623a788bfebece889068f5bcd59a61bac421fa85c6
                                                          • Instruction ID: b2b2edd4046c1c0258e72675dfd6caa77c6172a0369bc06765d586ca9d79aacc
                                                          • Opcode Fuzzy Hash: d40968a04be5c3a62ee5e1623a788bfebece889068f5bcd59a61bac421fa85c6
                                                          • Instruction Fuzzy Hash: 0EF03925A0EEC2A6E608AF22D4543FD6370EF89BC0F046032DE5F87392CE3CE0418201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: ea3b73ee264ef86e9660f00be7f1634d365b9ce8d7c3fbb965065c558432b960
                                                          • Instruction ID: cf6437e2bf334ca936883391f3145f61282328d00a29c96dd0cd7fbe7deee5c8
                                                          • Opcode Fuzzy Hash: ea3b73ee264ef86e9660f00be7f1634d365b9ce8d7c3fbb965065c558432b960
                                                          • Instruction Fuzzy Hash: 64512A66E0EEC6A4FB60DF25D8513F922B1FF987C8F446036CA0E86795DE3DA545C240
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: d62eaea2fd801f57e0c593681ac49efbe1e7a644230ff37243b0d065027e76c9
                                                          • Instruction ID: b3d73fa4757987c4cf7338756da8e20e37d5f06852845c81109f1e9ecd829baf
                                                          • Opcode Fuzzy Hash: d62eaea2fd801f57e0c593681ac49efbe1e7a644230ff37243b0d065027e76c9
                                                          • Instruction Fuzzy Hash: F1412966E0EEC5A8FB20DF25D8553F822B1FB98B88F446036CA4E86795CF3DA545C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 5ef5df8e38ee51008cd60846c0adde718a365eb0e9a2fa5e20bb93270715855e
                                                          • Instruction ID: e621673fc071d46d27d8b979092b330eaf0ffbb57ea31aa07a3637f7d13ca656
                                                          • Opcode Fuzzy Hash: 5ef5df8e38ee51008cd60846c0adde718a365eb0e9a2fa5e20bb93270715855e
                                                          • Instruction Fuzzy Hash: 5941606290DFC1A5F7659F29D9453E82370FB98798F04A221DE8C87751DF35D295C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 038cf73d8487698e413ec926c4d1693066d51f5eeb28cc3b5a13dbcfb78fb6d5
                                                          • Instruction ID: cbe6f629ee2cadfdcd7a01262c9ee92257d162c1d76c5580e46435f338666cc7
                                                          • Opcode Fuzzy Hash: 038cf73d8487698e413ec926c4d1693066d51f5eeb28cc3b5a13dbcfb78fb6d5
                                                          • Instruction Fuzzy Hash: 8531B026E0EEC2A1FA259F6694443B95671FF48BD0F286132CF1DD2790EE3DE081D240
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Value$FreeHeap
                                                          • String ID:
                                                          • API String ID: 911738859-0
                                                          • Opcode ID: ea0a8da814425dd029df1956a120a2e8baa3d0414911b5a299c57872757031cc
                                                          • Instruction ID: bff3b6533b2a3ff7b67847409d38fcd5815af337054c41b6a0ab9012417b4321
                                                          • Opcode Fuzzy Hash: ea0a8da814425dd029df1956a120a2e8baa3d0414911b5a299c57872757031cc
                                                          • Instruction Fuzzy Hash: 6A314F21A4FED675FA54AF2198513BE22B1EF847C0F94A439D90EC67D2DE2DF8458200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Value$FreeHeap
                                                          • String ID:
                                                          • API String ID: 911738859-0
                                                          • Opcode ID: 68bc9a191baf23316aea98b4d88f8c3084cfd6d6a8e27a37dd0e5954c5720e83
                                                          • Instruction ID: db09f3efff152076c618a6cd624c6a335d4f974c35dc7ddd94df501a45611af3
                                                          • Opcode Fuzzy Hash: 68bc9a191baf23316aea98b4d88f8c3084cfd6d6a8e27a37dd0e5954c5720e83
                                                          • Instruction Fuzzy Hash: 85319020E1FDC275FE55AF20A4112BA62B1EF847C4FA4B134D84EC26E2ED2DE5C6C211
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Value$FreeHeap
                                                          • String ID:
                                                          • API String ID: 911738859-0
                                                          • Opcode ID: b1d3348ff56e7c3df9743349acb2e37245fb3ab402315e1683676d6b14bcbc2e
                                                          • Instruction ID: 5edee23884b7e6143755214cd53269c770dadb7bcff6e5decf842ade0a916503
                                                          • Opcode Fuzzy Hash: b1d3348ff56e7c3df9743349acb2e37245fb3ab402315e1683676d6b14bcbc2e
                                                          • Instruction Fuzzy Hash: 00212D20A0FED2B5FE54AF2198113BD62B1EF487C4F64B538C94EC67E2EE2DE5458210
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Value$FreeHeap
                                                          • String ID:
                                                          • API String ID: 911738859-0
                                                          • Opcode ID: 735c025b4d040f25c0cab026f25b8a2cc3874044b410ebbb7ca0f50dfce732b0
                                                          • Instruction ID: 78c76e5c50eee8dc2b04506b66a0fe199ec9e5c2f290e14965a69f374ca010f1
                                                          • Opcode Fuzzy Hash: 735c025b4d040f25c0cab026f25b8a2cc3874044b410ebbb7ca0f50dfce732b0
                                                          • Instruction Fuzzy Hash: 64217120E0FE9265FE58AF1198513BD52B1EF447C4F54A435C90DC77E2EE2DE8818210
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: e6e65661dac2eb6877ed46c105a7693a807842a407bcf39b5e69bac055bdeddc
                                                          • Instruction ID: 75a51814f16af6ab731863068dbc64316e2438759da02bafb45212ac490af8f3
                                                          • Opcode Fuzzy Hash: e6e65661dac2eb6877ed46c105a7693a807842a407bcf39b5e69bac055bdeddc
                                                          • Instruction Fuzzy Hash: 3D316F22A1EEC1E8FB64DF65D8443FD23B0EB84789F516076CA0D9B6A5CF389585C601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: c81cfafdec61214b7d7a417e16ef500a21d3416b489dcbe3cc133d4bb35a3015
                                                          • Instruction ID: 7360f7a8253d5c0daca415750e36ad12360274f7041b36aa956a14449dfdac96
                                                          • Opcode Fuzzy Hash: c81cfafdec61214b7d7a417e16ef500a21d3416b489dcbe3cc133d4bb35a3015
                                                          • Instruction Fuzzy Hash: 03212C21D0EDC2A0F664EF9194543FE6271FF887C4F4460B2D94ECAAD6CF6EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 347ee7b86054963f62756996406dc54c49090177fe0620663a978de592d0cae5
                                                          • Instruction ID: 267a39bb34c31fe9b650f8b064a2928081a3a785d3ed7fa3f8f136b1c07d43cf
                                                          • Opcode Fuzzy Hash: 347ee7b86054963f62756996406dc54c49090177fe0620663a978de592d0cae5
                                                          • Instruction Fuzzy Hash: C2217110D0EEC2A0F660EF5694183FA66B1EF887C4F4460B1DA4ECAAD6CF7EE400D601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 973a582d513d9af513f8eec73152e4f9680ce93a101672e0634a89effb87cb13
                                                          • Instruction ID: 5ad0e5b1c81438ee00605f7d6c2f3783aab4e0072eeedf457d1153b207a2128b
                                                          • Opcode Fuzzy Hash: 973a582d513d9af513f8eec73152e4f9680ce93a101672e0634a89effb87cb13
                                                          • Instruction Fuzzy Hash: DD211D2190EEC2A0FA64EF9194543FA6271FF897C4F446076D94DCAA9ACF7EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: de086dee4c0585faf8604eba3a52c1caf0197a4a9d1370239ad03a54a5aa2bfa
                                                          • Instruction ID: 24452a48cbca51996738fbddd86df51f39ef2e6d9a0d1b642bffdb968ea30bcd
                                                          • Opcode Fuzzy Hash: de086dee4c0585faf8604eba3a52c1caf0197a4a9d1370239ad03a54a5aa2bfa
                                                          • Instruction Fuzzy Hash: 89211D25D0EDC2A0F664EF9194543FA6271FF897C4F446072D94ECAAD6CF7EE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 0a35b4d5bd2b94760577c78a406f28a14c5adedeb43a7d06f6af1d9420098c4a
                                                          • Instruction ID: 2420c8575efcd8332302b24d875ede3a5259f702abcb351e70d5d29ea64e29f5
                                                          • Opcode Fuzzy Hash: 0a35b4d5bd2b94760577c78a406f28a14c5adedeb43a7d06f6af1d9420098c4a
                                                          • Instruction Fuzzy Hash: F4214121D0EDC2A0F664EF9194143FA5271FF887C4F446072D94DCAAD6CFBED0449241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 21e9543109a9c9e2d93063b8f9d43beb704df71e964379078fee89bbb6bf6d0f
                                                          • Instruction ID: 8ee907aa7d4e6b07999d1a41c30c967136e81c8532b1e13ead821cff8a321eaa
                                                          • Opcode Fuzzy Hash: 21e9543109a9c9e2d93063b8f9d43beb704df71e964379078fee89bbb6bf6d0f
                                                          • Instruction Fuzzy Hash: FE212C25D0EEC2A0F664EF9194143FA6271FF887C4F446076D94ECAAD6CFBEE0449241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 802f2ac2fdf6c611206054f64869c7a7ecbbc247fa70cfbec9611b79bb94ca69
                                                          • Instruction ID: 80718ad4eb406ff4ccc5e30985f8f59a124eb8566e4faa85a3ddb7a87ccb8e4d
                                                          • Opcode Fuzzy Hash: 802f2ac2fdf6c611206054f64869c7a7ecbbc247fa70cfbec9611b79bb94ca69
                                                          • Instruction Fuzzy Hash: EB212C25D0EDC2A0F664EF9290143FA6271FF887C4F4460B2D94ECAAD6CFBEE4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 6cd09edfb741195c4b0dd663107b2fc4283678d1cb304eda37382fd6181d6dc2
                                                          • Instruction ID: a916e31d9bdbf116f305717014570d440062fb02ba1eed98dc6344dd0332e195
                                                          • Opcode Fuzzy Hash: 6cd09edfb741195c4b0dd663107b2fc4283678d1cb304eda37382fd6181d6dc2
                                                          • Instruction Fuzzy Hash: 5D210C25D0EEC2A0F664EF9194143FA62B1EF887C4F446076D94ECAA96CFBED4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: b9028015490bb83336510eb6d59fa7bdae8f1ba519b7102ff93fc6972d8863b3
                                                          • Instruction ID: b2fb237369b9ee937f57b1fded4a245108f12b9a259e9e7a88dabd3cae4247c8
                                                          • Opcode Fuzzy Hash: b9028015490bb83336510eb6d59fa7bdae8f1ba519b7102ff93fc6972d8863b3
                                                          • Instruction Fuzzy Hash: ED211A2190EDC2A0FA64EF6694543FB62B1EFC87C4F446072DA4DCAA9ACF7ED4449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 8aaad0215af1a416beb6ec1f73dd422ac0c8d67c1e611777a3087611cfd16b98
                                                          • Instruction ID: 3ca93e1311f0f7f7bd282f5bf3d9042e6a89c4adea91526fd084a643d035ebef
                                                          • Opcode Fuzzy Hash: 8aaad0215af1a416beb6ec1f73dd422ac0c8d67c1e611777a3087611cfd16b98
                                                          • Instruction Fuzzy Hash: A9211A2190EDC2A0FA64EF56A4543FB6271EFC87C4F446072DA4ECBA9ACF7ED4449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 412250ffd94d3f92b82567a5006ccbf80c148f0be6c78c040030f73ceef7b9bc
                                                          • Instruction ID: eb36cee82b6ddd4e4577791e9bb53d8aa25f963ae6105b69d8ac32ecfd3892ca
                                                          • Opcode Fuzzy Hash: 412250ffd94d3f92b82567a5006ccbf80c148f0be6c78c040030f73ceef7b9bc
                                                          • Instruction Fuzzy Hash: 17213A2190EEC2A0F660EF5694183FA6271FFC87C4F446072D54ECAA9ACF7EE0449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 5c7418ecb9874727564476e982fb176cb60d973220dbc7b64b29b929e6a7bda4
                                                          • Instruction ID: 31deb138753508affa2c632787b9b9f3d2b842e24f4982e5a9560c838f307a46
                                                          • Opcode Fuzzy Hash: 5c7418ecb9874727564476e982fb176cb60d973220dbc7b64b29b929e6a7bda4
                                                          • Instruction Fuzzy Hash: F321291190EEC2A0F664EF9694583FA62B1EFC87C4F446075D64ECAA9ACF7EE0449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 096b6fa724d70a193df5d31adb74ca4b6b7b7b4d1035b8f890a5399c994b9549
                                                          • Instruction ID: 696215358a61b399a7a3dbf888b3db38405a8239f07cd42fa293f2762ca95434
                                                          • Opcode Fuzzy Hash: 096b6fa724d70a193df5d31adb74ca4b6b7b7b4d1035b8f890a5399c994b9549
                                                          • Instruction Fuzzy Hash: FA214A1190EEC2A0F620EF5694583FA62B1FFC87C4F446072D64ECAA9ACE7EE0449601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 74f2d71cddd68faeabf9a41f9ff90989954d8ac98b51e2ff1940b327a7378041
                                                          • Instruction ID: 914d43191a0555ab7985bb3b03145c0201f5b745816e1e2ac275d67c200d4755
                                                          • Opcode Fuzzy Hash: 74f2d71cddd68faeabf9a41f9ff90989954d8ac98b51e2ff1940b327a7378041
                                                          • Instruction Fuzzy Hash: D7113010D0EEC2A0F624EF5694543FA6671FFC87C4F446075D64ECA6D6CE7EE0049601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: f666784d679325d9f89b3a0132f563695c145a0220450f85ca7027d123658662
                                                          • Instruction ID: b4e23952816223396b7681d73494158317d9fdac69b9e68a5af606650568be99
                                                          • Opcode Fuzzy Hash: f666784d679325d9f89b3a0132f563695c145a0220450f85ca7027d123658662
                                                          • Instruction Fuzzy Hash: 4B113D1190EEC2A0EA64EF56D4543FAA3B1FFC87C4F446071D54EC66AACF7DE4448601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: f791c38d76cd835e94ce239caee589e6f48de2c7c8aa2c2ff2737a9cd4f1ca30
                                                          • Instruction ID: c75b73c0cb500d38202898bcffd37bdf7e7d02a789d03b6336f6bd5cdaa87670
                                                          • Opcode Fuzzy Hash: f791c38d76cd835e94ce239caee589e6f48de2c7c8aa2c2ff2737a9cd4f1ca30
                                                          • Instruction Fuzzy Hash: AD01FB1590EEC2B8FB28AF22C8653FD2270EF857C9F417472D90ECA6D6CE2CE1449241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: baa4109bac70fc4e0d9396353063245ec76f4ec9211646d206311f8c180a8004
                                                          • Instruction ID: fb3b4befa2b7dd3ad6064eff43bfa9ae006fe82bc66fb1acfef3bcb1148bc348
                                                          • Opcode Fuzzy Hash: baa4109bac70fc4e0d9396353063245ec76f4ec9211646d206311f8c180a8004
                                                          • Instruction Fuzzy Hash: 3401E81590EEC2B8FB28AF2188653FD2270EF857C9F407476D90ECA6D6CE2CE144D241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: d3495ba5369f1b84fde97e31c708fbcd0bbb5f608b6357f81fea9dd0b8dc9a8f
                                                          • Instruction ID: e401032a9ffcb7d101c47fd9ea45cfdde82367b9b41a075860f583572aefa704
                                                          • Opcode Fuzzy Hash: d3495ba5369f1b84fde97e31c708fbcd0bbb5f608b6357f81fea9dd0b8dc9a8f
                                                          • Instruction Fuzzy Hash: 82F0CD1490EEC2B8FB64AF2288653FD1270EF897C5F417471D90ECA6D6CE2CE1449241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: 97b32e02ad1eccc2b50d9cae848424f80373cb73d580784eee50bb38dd2ff019
                                                          • Instruction ID: 5d3b45404de0cc00e531871d321019171b434ab1c97567c928382c15dc466dff
                                                          • Opcode Fuzzy Hash: 97b32e02ad1eccc2b50d9cae848424f80373cb73d580784eee50bb38dd2ff019
                                                          • Instruction Fuzzy Hash: ADF0E11490EEC2B8FB64AF2198553FD1270EF897C5F417471D90ECA6D6CE2DE144D241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: d1cca292100bf6de69836079573cc3af6bdf7c24fc5e777f98ca4a24b2839049
                                                          • Instruction ID: c4de0cf5b6776a1b2f6d730a47832aefc49456775da77ac0f96f5a8328d4d7c1
                                                          • Opcode Fuzzy Hash: d1cca292100bf6de69836079573cc3af6bdf7c24fc5e777f98ca4a24b2839049
                                                          • Instruction Fuzzy Hash: 85F0C91490EEC2A8FB68AF2198653FD2270EF89BC9F407471D90ECA696CE2CE1449241
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memset$CaptureContextExceptionRaiseUnwindabort
                                                          • String ID: assertion failed: filled <= self.buf.init/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\core\src\io\borrowed_buf.rs
                                                          • API String ID: 2704192948-4183801151
                                                          • Opcode ID: d5a33d3bddb0a4a780526fc9d236898dc735f92c5c76aebb881641ffe56a149a
                                                          • Instruction ID: bb6d9ccae2046da1f3297936fb907ba9938cbc2e01e12af5dbe3a845118593dd
                                                          • Opcode Fuzzy Hash: d5a33d3bddb0a4a780526fc9d236898dc735f92c5c76aebb881641ffe56a149a
                                                          • Instruction Fuzzy Hash: 6751E693A0EAC166E715DFA2A8442B9AB70FB49BD0F59A431CF4DD3792DD3CD5828300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFreeHandleHeapmemcpy
                                                          • String ID: .exeprogram not found
                                                          • API String ID: 1491206654-419964536
                                                          • Opcode ID: 276690e03bd6044dbc9c08db838838f13a27c421a85d06b98499b2c59bc1a317
                                                          • Instruction ID: 4a4b2db5ff5fda39835db423715657b11ca69b57eb8671e65514cc49283df922
                                                          • Opcode Fuzzy Hash: 276690e03bd6044dbc9c08db838838f13a27c421a85d06b98499b2c59bc1a317
                                                          • Instruction Fuzzy Hash: 20716C62B5EF9294FB648FA199903FD22B1EB957C9F056035DE0E97B88DF3891418300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: Sleep_amsg_exit
                                                          • String ID:
                                                          • API String ID: 1015461914-0
                                                          • Opcode ID: 2806e2a2a2e69e3b7c85737c28f0dd3d7904b8af9b5a9a57c84f78b6dfa5bd1b
                                                          • Instruction ID: 05366a39c5e56b20c720cf25d69155bd5586ec2b27077643f4dc91619610c3d7
                                                          • Opcode Fuzzy Hash: 2806e2a2a2e69e3b7c85737c28f0dd3d7904b8af9b5a9a57c84f78b6dfa5bd1b
                                                          • Instruction Fuzzy Hash: DB415B61A0EEC6A5FB294F96E89067A22F1EF487C0F44A071DA4DC7790DE6CE8418340
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseFileHandleUnmapView
                                                          • String ID:
                                                          • API String ID: 238406573-0
                                                          • Opcode ID: fdf93351b17bb99f04dc049e421e9081e2b00180d34b628a9a767d57385448be
                                                          • Instruction ID: 632bfffa6e3b6101a41a1baa3f794714ed13b981bc8e2c2cdd364f991b8c0881
                                                          • Opcode Fuzzy Hash: fdf93351b17bb99f04dc049e421e9081e2b00180d34b628a9a767d57385448be
                                                          • Instruction Fuzzy Hash: 74215426A0FDC1A5E629DF1698443B967B0EB5C7D4F49A432CE0D86391DE3DE482D200
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$CreateErrorEventLast
                                                          • String ID:
                                                          • API String ID: 3743700123-0
                                                          • Opcode ID: 22774e09b3d67be6a5e0fec3e62d86911746476b66fcfe515472d2d116eec0d0
                                                          • Instruction ID: e0ae4935b0a3d5a176bb35c217293c2db0f44059816f18ae994fa4fb95052830
                                                          • Opcode Fuzzy Hash: 22774e09b3d67be6a5e0fec3e62d86911746476b66fcfe515472d2d116eec0d0
                                                          • Instruction Fuzzy Hash: F911A522A0EB81A6F7195F12A5513792560FB887D0F186134DE4D47BC1DF7CE4A28300
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID: RUST_BACKTRACElibrary\std\src\env.rs$lluf$mluf
                                                          • API String ID: 3298025750-2275200021
                                                          • Opcode ID: 200d7e0c29b1dfca4d0256e81b9e4da546865e51008cc6a058b3c008fb9fbbf5
                                                          • Instruction ID: b77864e7da161e399a215dfbbd7aacee9d2e96facad524d8ea33f5d687c913dc
                                                          • Opcode Fuzzy Hash: 200d7e0c29b1dfca4d0256e81b9e4da546865e51008cc6a058b3c008fb9fbbf5
                                                          • Instruction Fuzzy Hash: 0A01A166F4FED2A5FE288F7594A03BE2AB1DB407C8F44643AC90E86790CE2DE1409311
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID: CCG $TSUR
                                                          • API String ID: 3997070919-2088351922
                                                          • Opcode ID: 37d729a65597a38692ac768cf52d019ef1ce9e94d42c255c0a289bd06af29fff
                                                          • Instruction ID: df8a60cef520bb4186047c185d581812cd22b4da6568b01d35fe833d4124cfb3
                                                          • Opcode Fuzzy Hash: 37d729a65597a38692ac768cf52d019ef1ce9e94d42c255c0a289bd06af29fff
                                                          • Instruction Fuzzy Hash: D721E122E2EEC596E614EF5198002BD6730FFD8B80F51A235EE8D43391EF2CD1918300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 693c0ca78a5ab491943ed54679dfc6408e036e4571ae0d6a34152cd519acba74
                                                          • Instruction ID: 16a5e553855de7f4459ee8bfbbb32feefddd8433689b573db05490b5c24880dc
                                                          • Opcode Fuzzy Hash: 693c0ca78a5ab491943ed54679dfc6408e036e4571ae0d6a34152cd519acba74
                                                          • Instruction Fuzzy Hash: ED717D66A0EF8191EB649F5694413B967B4FF65BE0F44A631DE2E873D1DE389580C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: memcpy$FreeHeap
                                                          • String ID:
                                                          • API String ID: 4250714341-0
                                                          • Opcode ID: 299d0f2c268ca4c8a6c9c2f47ee731c76563184286210afb219e3abc9259118d
                                                          • Instruction ID: 31c1d6fe1b7a5a5486136b8f9a15c52685e373cbfeffc71bbb700ec45bed852e
                                                          • Opcode Fuzzy Hash: 299d0f2c268ca4c8a6c9c2f47ee731c76563184286210afb219e3abc9259118d
                                                          • Instruction Fuzzy Hash: 1C71CF22A09FC9A6EA459F24E8053F963B4FF543C8F45A231EE4D52665EF38E195C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFreeHandleHeap
                                                          • String ID:
                                                          • API String ID: 1642312469-0
                                                          • Opcode ID: 7a199230194994a141ea2b5f255e1902a26be938285c6e57208e8c0f39b4893b
                                                          • Instruction ID: 45930cb67b1bf88abf12928c93ed260cc21582018003a2b71c572608fe7ee642
                                                          • Opcode Fuzzy Hash: 7a199230194994a141ea2b5f255e1902a26be938285c6e57208e8c0f39b4893b
                                                          • Instruction Fuzzy Hash: E2715926A0AED694EB608F61D8403FD23B1FB84B99F016136CA5D9BB99DF389541C301
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeapmemcpy
                                                          • String ID:
                                                          • API String ID: 673829100-0
                                                          • Opcode ID: d6957715def72a4b84fdffda6a55135e6c3ad7079cd5b8b42c64aca4fb0b7981
                                                          • Instruction ID: 2cf37253c15b011a7bbae3e9d8e8ed3df2ebf52bfabbcc28395d600d8b736228
                                                          • Opcode Fuzzy Hash: d6957715def72a4b84fdffda6a55135e6c3ad7079cd5b8b42c64aca4fb0b7981
                                                          • Instruction Fuzzy Hash: 3F518C22A09ED4A6E7059F25A8053E923B4FB88BC8F45A135DE4D57765EF38E1A5C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 6e95642452edf8bfe2195f95b87f29dd5c3e2193d21cc49717314d503b32f2b2
                                                          • Instruction ID: 33f8ef4bcd0a291bb2c113ff801c7bfc865fecef7ac464767f80a8f929375d55
                                                          • Opcode Fuzzy Hash: 6e95642452edf8bfe2195f95b87f29dd5c3e2193d21cc49717314d503b32f2b2
                                                          • Instruction Fuzzy Hash: 70416222A4EEC1A8FB649F61D8503FA23B5FB847C8F446036DA0D8B795CF7D95458300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: cd7efd18000bbd183145134c62aa1632efeac5a76a281a79d29b60d1fd68afb1
                                                          • Instruction ID: 2d39114e7aab22dab3fa922e66eeaf43f005b90ec5d0536557567bd6399611f0
                                                          • Opcode Fuzzy Hash: cd7efd18000bbd183145134c62aa1632efeac5a76a281a79d29b60d1fd68afb1
                                                          • Instruction Fuzzy Hash: C9412966E0EEC5A8FB20DF65D8513F823B1FB98788F446436CA4E86799DE3DA545C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 424ad0b0270bac0c72a92c545cab50623caa7b2fe2889f8a2da2c1dc14ef46cc
                                                          • Instruction ID: 0c4bfd49f09b1685187e86950c3716fc166ba27b1df326c9bc73547af420b6c7
                                                          • Opcode Fuzzy Hash: 424ad0b0270bac0c72a92c545cab50623caa7b2fe2889f8a2da2c1dc14ef46cc
                                                          • Instruction Fuzzy Hash: 70415C66E0EEC5A8EB50DF65D8503F823B1FB98B88F446036CA4E87794DE3DA545C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 0bb46acf441583ef9b338bffe33abe575d247e98f4f341858a6de0ca8fb36321
                                                          • Instruction ID: 0937dd1c17d6d512dcb6d22c3c8686617324e24dae1486f79ab9704f91edde57
                                                          • Opcode Fuzzy Hash: 0bb46acf441583ef9b338bffe33abe575d247e98f4f341858a6de0ca8fb36321
                                                          • Instruction Fuzzy Hash: 85412866E0EEC5A8FB20DF65D8513F823B1FB98788F446436CA4E86B94DE3DA545C300
                                                          APIs
                                                            • Part of subcall function 00007FF8A932D7F0: HeapFree.KERNEL32(?,?,?,?,00007FF8A9322AE5,?,?,00007FF8A9334545,?,?,?,00007FF8A932790C,?,?,?,?), ref: 00007FF8A932D83C
                                                            • Part of subcall function 00007FF8A932D7F0: HeapFree.KERNEL32(?,?,?,?,00007FF8A9322AE5,?,?,00007FF8A9334545,?,?,?,00007FF8A932790C,?,?,?,?), ref: 00007FF8A932D84F
                                                            • Part of subcall function 00007FF8A932D7F0: HeapFree.KERNEL32(?,?,?,?,00007FF8A9322AE5,?,?,00007FF8A9334545,?,?,?,00007FF8A932790C,?,?,?,?), ref: 00007FF8A932D88C
                                                          • HeapFree.KERNEL32 ref: 00007FF8A9327737
                                                          • HeapFree.KERNEL32 ref: 00007FF8A9327789
                                                          • HeapFree.KERNEL32 ref: 00007FF8A93277C6
                                                          • HeapFree.KERNEL32 ref: 00007FF8A93277FA
                                                          • HeapFree.KERNEL32 ref: 00007FF8A9327812
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 28a6f0f83e0a67cce6be4328e099f04266549f5cd66ea06786b9f5af26052328
                                                          • Instruction ID: 856543906b629bc97ceed1a66dca1b560e09ef313f75c08551429d23fe335815
                                                          • Opcode Fuzzy Hash: 28a6f0f83e0a67cce6be4328e099f04266549f5cd66ea06786b9f5af26052328
                                                          • Instruction Fuzzy Hash: 41411866A0EEC5A8FB20DF65D8513F823B1FB98788F446036CA4E86795DE3DA545C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: a640d48f42fb024064c16b48f5f7b916bdaf68796727baf8b2bea284c2d4003d
                                                          • Instruction ID: a74068793de41a7132d74c37331563390420a958124659d049c662e86db370b6
                                                          • Opcode Fuzzy Hash: a640d48f42fb024064c16b48f5f7b916bdaf68796727baf8b2bea284c2d4003d
                                                          • Instruction Fuzzy Hash: 85411866A0EEC5A8FB20DF65D8513F823B1FB98788F446036CA4E86795DE3DA545C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 7dcab15a25afd12cfa40928cb609c57d7eaf4288df903cecd842bf233f02cbd4
                                                          • Instruction ID: c289fa5675e0279e1668f08fdb0950ccbfbba554d215ad6f1a4b8d1191768739
                                                          • Opcode Fuzzy Hash: 7dcab15a25afd12cfa40928cb609c57d7eaf4288df903cecd842bf233f02cbd4
                                                          • Instruction Fuzzy Hash: D0417E2290DFC4A6E7269F29D9413E823B0FB98798F04A222DF8C47751DF39D2A5C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 81bd202239e1a02be7b2a2ddf9139458fa46ee743f2e8f5a0567acaf4f42843f
                                                          • Instruction ID: 995fccabe35d5a1522ba057335fe57dd21abc6b7429ce4b287741dedaee8fe7c
                                                          • Opcode Fuzzy Hash: 81bd202239e1a02be7b2a2ddf9139458fa46ee743f2e8f5a0567acaf4f42843f
                                                          • Instruction Fuzzy Hash: 59412966A0EEC5A8FB54DF65D8513F823B1FB98B88F446036CA4E87794DE3DA551C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 614c50f6ca0e1b5217f5767bf0dab9a1b6caf8a970bbaa8eaef40918485a577b
                                                          • Instruction ID: 22c40195af22d124c7224c572d93de18ca8de772be6127757f9a7d751f784c59
                                                          • Opcode Fuzzy Hash: 614c50f6ca0e1b5217f5767bf0dab9a1b6caf8a970bbaa8eaef40918485a577b
                                                          • Instruction Fuzzy Hash: CF412966A0EEC5A8FB10DF65D8513F823B1EB98B88F446436CA4E87794DE3DA551C300
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 48cd72ec96ddfafecf7e0642ecaeb4dc4a73ea58f3ac8d6f0e0e4111ad13caf2
                                                          • Instruction ID: 4c33981f33cbfbdeeb24828a9925ed73f853f18c8c6a4299852fae48faa63119
                                                          • Opcode Fuzzy Hash: 48cd72ec96ddfafecf7e0642ecaeb4dc4a73ea58f3ac8d6f0e0e4111ad13caf2
                                                          • Instruction Fuzzy Hash: B031C066A0EEC2A5EB648F25C8643F827B1EB557D8F00A232D92D877D8CE3DD540D341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 976bab54dd6ea4f6442af5e21e3fe2a71e925d9815f329d455bcbd961097c0b9
                                                          • Instruction ID: b97a154674c5d93dfe67cf95bdc8220b6dcdae965c6657f3cb47a7e3b0d4d59f
                                                          • Opcode Fuzzy Hash: 976bab54dd6ea4f6442af5e21e3fe2a71e925d9815f329d455bcbd961097c0b9
                                                          • Instruction Fuzzy Hash: BC317C22E1EEC1E8FB64DF65D9443FD23B0EB84789F156076CA0D9B698CF389585C601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: f714866ea91c8bc6d84c80810eb16a265f3d906d05e18c518da4da0490cce9f1
                                                          • Instruction ID: 0b279a7c571268cdab773c1dafe98f858abdf603dd1419cd5a04e1ef9122763a
                                                          • Opcode Fuzzy Hash: f714866ea91c8bc6d84c80810eb16a265f3d906d05e18c518da4da0490cce9f1
                                                          • Instruction Fuzzy Hash: 9731A225A0EEC2E5E7B08F25D8983F827B0EB547C8F54A032D90D86794CE3EE5419301
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: aaa39a4c98393ff635097adb283b0a558a10cbb644286456d830cdac8f06bef1
                                                          • Instruction ID: 17726998d046f0a1bdf2dfc86c79e3167905c89052a977237376a6b3aa652f11
                                                          • Opcode Fuzzy Hash: aaa39a4c98393ff635097adb283b0a558a10cbb644286456d830cdac8f06bef1
                                                          • Instruction Fuzzy Hash: 22319125A0EEC2E5E7708F25D8583F827B0EB547C8F44A032D90D86794CF3EE5419341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$memcpy
                                                          • String ID:
                                                          • API String ID: 1887603139-0
                                                          • Opcode ID: 4202d426624c05b5481c714ff2566854147ff5ad8f2ff3ef7743bf150e926248
                                                          • Instruction ID: 8a5ea35922b56a15e56334a8f95637456a94045cc178c4f820e7560a729f98ff
                                                          • Opcode Fuzzy Hash: 4202d426624c05b5481c714ff2566854147ff5ad8f2ff3ef7743bf150e926248
                                                          • Instruction Fuzzy Hash: FA216D2590EEC2E4FB249F2584683F82371EF557E8F44A232D92E866D4CE3DE545A341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$abort$CaptureContextExceptionRaiseUnwind
                                                          • String ID:
                                                          • API String ID: 1327955162-0
                                                          • Opcode ID: 5892259aef27dbb5a292326611d28530ac7f55136ad951a08d068180019d1f7f
                                                          • Instruction ID: 00a65c9d99f200c74a3bfa7013b75fb38c583f4c03c1b9479315379368aba99d
                                                          • Opcode Fuzzy Hash: 5892259aef27dbb5a292326611d28530ac7f55136ad951a08d068180019d1f7f
                                                          • Instruction Fuzzy Hash: B8212C1190EEC2A0F624EF96A4583FE5271FF847C0F442175DA4ECAADACF7DD0408640
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: f9ce4ba5cf43efaee98ba4d1215b8f7eac5ba93627644fcbed06328eaa90a573
                                                          • Instruction ID: 969e69e6a9077f6747680a22c5b73c4401bf81d592a4a30baa1b78dba49c3cee
                                                          • Opcode Fuzzy Hash: f9ce4ba5cf43efaee98ba4d1215b8f7eac5ba93627644fcbed06328eaa90a573
                                                          • Instruction Fuzzy Hash: 1A21282590FEC2E8E7649F2598983F823B0EB597C8F446036D90D8A699CE3EE545A341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: e4e5007bf3e68d20a92d55b07ddf980c58e14553e6c91346be46602ca8e63213
                                                          • Instruction ID: 58132515846f39304c3684b01e47a60a4c400e17a1be5b19af6add86e11275fe
                                                          • Opcode Fuzzy Hash: e4e5007bf3e68d20a92d55b07ddf980c58e14553e6c91346be46602ca8e63213
                                                          • Instruction Fuzzy Hash: 07217F2590FEC2E8F7B49F2598943F823B0EB547C8F546032D90DCA694CE3DE541A301
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 1c59e3edae4415c1090eac1fa2cd51cb337f691613abb89c0ffa58d220f2a141
                                                          • Instruction ID: 87c9a6000b409621d4712a5ab641c67598e7f89636c971ac2643290ef95f5d5a
                                                          • Opcode Fuzzy Hash: 1c59e3edae4415c1090eac1fa2cd51cb337f691613abb89c0ffa58d220f2a141
                                                          • Instruction Fuzzy Hash: 3D214F2590FEC2E8F7749F2598943F823B0EB557C8F546032D90DCA694CE3EE545A341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 092f30c392a24da3c60fc7f4ee9fff4746986268c5b1a00d372f712165d85b1c
                                                          • Instruction ID: 912811988eb1cbb11a508280cdc88118747e556f665077f610007aa533e317e0
                                                          • Opcode Fuzzy Hash: 092f30c392a24da3c60fc7f4ee9fff4746986268c5b1a00d372f712165d85b1c
                                                          • Instruction Fuzzy Hash: D0213B2590FEC2E8F7649F2598583F823B0EB557C8F446032D90DCA694CF3EE545A341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 1c2ae8970281d2d152e4d4da2a23ed301540d0ee8637ead7c383296c4cc442cb
                                                          • Instruction ID: 34321f37e7d46ec5d79c4fc8b13722a90b3b74ee917337fcbaf29412cdee13ca
                                                          • Opcode Fuzzy Hash: 1c2ae8970281d2d152e4d4da2a23ed301540d0ee8637ead7c383296c4cc442cb
                                                          • Instruction Fuzzy Hash: F2211B2590EEC2E8E7649F25D8983F823B0EB597C8F446032D90D8A695CF3EE545A341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 7a6af4161f14224653f8133faf9d74ddbccae0216a60aff6938acf1d44f8271d
                                                          • Instruction ID: 3b83eb6adae39b93e08e747d37a5229697390ec1cd48d896b18aace06ffb5641
                                                          • Opcode Fuzzy Hash: 7a6af4161f14224653f8133faf9d74ddbccae0216a60aff6938acf1d44f8271d
                                                          • Instruction Fuzzy Hash: 08212C2590FEC2E8E7649F25D8983F823B4EB597C8F546032D90DCA794CE3EE545A341
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 9f277537636735aada9a51d2360e07bdd4599c25415202eaed14db3b8186863e
                                                          • Instruction ID: c75a42e155725682978e45ab7d7a8b907cf5535508510a2b07fb757b2f8cfac9
                                                          • Opcode Fuzzy Hash: 9f277537636735aada9a51d2360e07bdd4599c25415202eaed14db3b8186863e
                                                          • Instruction Fuzzy Hash: 4E21BA2590EEC2E4EB249F2588A83F923B1EF95BD8F44A132D91D866D4CE3DE141A301
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 2f27702dc60d2f0512b04bf1bc3bce9a573af3ca80652dff5945a24905800ee0
                                                          • Instruction ID: aceb83d36fddeab65e4971a72d37d79460408dc0fee08bf3dd7705fa79738c8f
                                                          • Opcode Fuzzy Hash: 2f27702dc60d2f0512b04bf1bc3bce9a573af3ca80652dff5945a24905800ee0
                                                          • Instruction Fuzzy Hash: 4D214A1190EEC2A0F670EF5594183FA66B1EF88784F4460B1D64ECAA9ACF7EE4409601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 8e9988840aa1e6ee7b288039242b90d9082cbe6af18d6761f91f634dac2ba325
                                                          • Instruction ID: b2ed10748d8135fa45481687296febe48cfc18a1f7c61f019bca2ed8c874834b
                                                          • Opcode Fuzzy Hash: 8e9988840aa1e6ee7b288039242b90d9082cbe6af18d6761f91f634dac2ba325
                                                          • Instruction Fuzzy Hash: 62114C11D0EEC2A0F620EF9694583FA6671EFC87C4F4460B1D64ECAADACE7EE0009601
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap
                                                          • String ID:
                                                          • API String ID: 3298025750-0
                                                          • Opcode ID: 0566187213d73907f5599e2d82ba6da10116f16a301e606f0204d7fd81f9f647
                                                          • Instruction ID: 242bb034356dc1c078f0451f88f7e9f43f2d110b868e7f156990f2dc700fc9d9
                                                          • Opcode Fuzzy Hash: 0566187213d73907f5599e2d82ba6da10116f16a301e606f0204d7fd81f9f647
                                                          • Instruction Fuzzy Hash: D2113D21D0EDC2A0FA64EF5694143FA62B1EFC87C4F446072DA4ECAAD6CF7ED4449201
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 35e56fb1f82ee45a8ec0be6c85e314330f8d63024748e9c6f04f0cba8ef3ace2
                                                          • Instruction ID: 839f12eb02b9e13ffdb70cc151651959ebab6f11fdd36f5089b8986f59b48179
                                                          • Opcode Fuzzy Hash: 35e56fb1f82ee45a8ec0be6c85e314330f8d63024748e9c6f04f0cba8ef3ace2
                                                          • Instruction Fuzzy Hash: 23112B2190EDC2A0EA20EF96D4553FA6771FFC87C4F446072D64ECAAEACE6DE4448640
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 6f1c778b1043ce5c4515c719b8439a79ac6796909c3a36f3e2584c820f6bdc7c
                                                          • Instruction ID: 68d2b46169471899c64899409f89a4a6dbd7f82f575e5a59817938aac9aa27f5
                                                          • Opcode Fuzzy Hash: 6f1c778b1043ce5c4515c719b8439a79ac6796909c3a36f3e2584c820f6bdc7c
                                                          • Instruction Fuzzy Hash: 4F114C1190EDC6A0EA60EF96D4593FA62B1FFC87C0F846071E64EC66EACE7DE440C600
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 0bfa028432db9a10137cc68a0ebb823f194a60a9226239242768e5e79dc9ef3e
                                                          • Instruction ID: 240ba839880f1010e08f470b9451e0f30d3c9be71f16fe0fb1a421cde7f420cd
                                                          • Opcode Fuzzy Hash: 0bfa028432db9a10137cc68a0ebb823f194a60a9226239242768e5e79dc9ef3e
                                                          • Instruction Fuzzy Hash: 8E115B1190EEC2A0E664EF56D4583FAA3B1FFC8BC4F446071D64EC66AACF7DD4408600
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: FreeHeap$CloseHandle
                                                          • String ID:
                                                          • API String ID: 1910495013-0
                                                          • Opcode ID: 6c9288677f01b4ba7eecc4d2c393b739d751872e387bb4cdc77548e7ae6b1535
                                                          • Instruction ID: a66033b37b612d02bcdcfb8c81af5e795f34e058c9ce1c9c35dec672b07b4418
                                                          • Opcode Fuzzy Hash: 6c9288677f01b4ba7eecc4d2c393b739d751872e387bb4cdc77548e7ae6b1535
                                                          • Instruction Fuzzy Hash: E4014C1590EDC2A0E664EF56D4183FAA7B1FFC8BC4F446071DA4ECA6AACF7DE4408600
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: fa3216b5d43bb4dc64bfe5e81a82c1d356ea0ad4b608b2f9cc36d2a0914ea8cb
                                                          • Instruction ID: bcc75c26ae5755340f0b118ac02da7b3430d9d5f761cc4479351ef896ee55e51
                                                          • Opcode Fuzzy Hash: fa3216b5d43bb4dc64bfe5e81a82c1d356ea0ad4b608b2f9cc36d2a0914ea8cb
                                                          • Instruction Fuzzy Hash: 4001A415A0EEC2A8EB64EF31D8553FD2270EF857C9F417072E90ECA696CE2DE145D241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: bf1781f6e3866917d0d02452ac8eeae28f382fde46d7386b9bca9f5d1ba4885b
                                                          • Instruction ID: bcc75c26ae5755340f0b118ac02da7b3430d9d5f761cc4479351ef896ee55e51
                                                          • Opcode Fuzzy Hash: bf1781f6e3866917d0d02452ac8eeae28f382fde46d7386b9bca9f5d1ba4885b
                                                          • Instruction Fuzzy Hash: 4001A415A0EEC2A8EB64EF31D8553FD2270EF857C9F417072E90ECA696CE2DE145D241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFreeHandleHeap
                                                          • String ID:
                                                          • API String ID: 1642312469-0
                                                          • Opcode ID: 7e50c8ae8127694478953b4d46517d7a9d04455dada6b78dcd8e41f8ed7f1500
                                                          • Instruction ID: 5f3725f2e56a67b1e9e0fff509e79d1b0d48f2dec59cdfd4c1f89f5088995435
                                                          • Opcode Fuzzy Hash: 7e50c8ae8127694478953b4d46517d7a9d04455dada6b78dcd8e41f8ed7f1500
                                                          • Instruction Fuzzy Hash: CCF0C91590EEC2A8EB64AF21C8653FD2270EF857C9F407076D50ECA6D6CE2CE1449241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$FreeHeap
                                                          • String ID:
                                                          • API String ID: 2735614835-0
                                                          • Opcode ID: 9fa77a0da0bdeb011a8e95ded042a9900748a6df1b4e795fc97fe10b7b97837c
                                                          • Instruction ID: f59f0e83fb855d2ce2e94eb577f714729bb4e6b5afb190209694b0e6ee3f3fcd
                                                          • Opcode Fuzzy Hash: 9fa77a0da0bdeb011a8e95ded042a9900748a6df1b4e795fc97fe10b7b97837c
                                                          • Instruction Fuzzy Hash: 48F01414A0EEC6A8EB64EF31C8553FD2270EF897C9F407432E90ECA696CE2CE144C241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseFreeHandleHeap
                                                          • String ID:
                                                          • API String ID: 1642312469-0
                                                          • Opcode ID: 8844cfa4f3ecf9a3674ced53c3a262d7b173508b0bfe679dda287b5f2ff1088c
                                                          • Instruction ID: 6296fe20342e7b62c2496a9f10f8ef873f8160f37e9e83e0da039257c34dc488
                                                          • Opcode Fuzzy Hash: 8844cfa4f3ecf9a3674ced53c3a262d7b173508b0bfe679dda287b5f2ff1088c
                                                          • Instruction Fuzzy Hash: D0F0F91490EEC2A8FB24AF2188653FD2270EF897C9F407471D90ECA696CE2CE1449241
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000006.00000002.3246614456.00007FF8A9301000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF8A9300000, based on PE: true
                                                          • Associated: 00000006.00000002.3246590829.00007FF8A9300000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246657948.00007FF8A9372000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9373000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246676681.00007FF8A9392000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246720931.00007FF8A9398000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246742082.00007FF8A9399000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246767584.00007FF8A939A000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                          • Associated: 00000006.00000002.3246789441.00007FF8A939D000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_6_2_7ff8a9300000_regsvr32.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle$abort$CaptureContextExceptionRaiseUnwind
                                                          • String ID:
                                                          • API String ID: 2803952147-0
                                                          • Opcode ID: de80a76cf8ff7457b6c3fccbe0903b051dc1579ec8fc195c4452e6d0c255da71
                                                          • Instruction ID: 1e524d5538296e4551f282fc5c3c01fdc2c0c85c9e0d32d177603253d5a4f080
                                                          • Opcode Fuzzy Hash: de80a76cf8ff7457b6c3fccbe0903b051dc1579ec8fc195c4452e6d0c255da71
                                                          • Instruction Fuzzy Hash: 63E07D15A0EA86B9E508BE6194553BD6670AF99FC1F5470B0E90F87797CD2CA0018204